GASH Review3
GASH Review3
▪ Abstract
▪ Summary of Literature Survey
• Suggestions from Review – 2
• Proposed Methodology / Design Approach
• Architecture
• Design Description
• Technologies Used
• Project Progress
• References
Abstract
1. Novelty:
Unlike static approaches, GASH innovatively integrates reinforcement
learning models with the OpenAI API to dynamically enhance deception
tactics against attackers.
2. Innovativeness:
This project uniquely integrates RL-based attack identification with
advanced language models to compose fault-proof responses, effectively
deceiving attackers while maintaining operational security.
3.Interoperability:
Interoperability is ensured by adhering to the SSH protocol, facilitating
seamless communication between components. Standardized APIs are
provided for integration with external systems.
Design Details
4. Portability:
As the proposed solution, GASH, is not a physical system used as a
honeypot but instead a virtual one, it provides greater portability over
existing high-interaction honeypot systems which are typically
full-scale systems.
5. Security
As GASH is a virtual high-interaction honeypot, intended to run inside
a VM, any potential attacker would be sandboxed and unable to have
an impact on real systems/host machines. This is a step above
traditional high-interaction honeypots which are full systems, that can
prove vulnerable.
Proposed Methodology / Approach
Current System :
Proposed System:
Actions:
● Allow: This action allows the execution of a command inserted by an attacker.
● Block: This action blocks the execution of the command and for each command, provides
specific blocking messages. E.g: blocking a wget command can lead an attacker to use an
alternative repository and this may reveal another attacker controlled location. This is
viable as it has been proved that the lifetime of malicious code repositories is ~1h so it is
not unusual for GASH to return an error code.
● Fake output: The output of a command is faked, and for each command, provides specific
faked output. The stored fake output is a modified copy of a normal one and for different
types of commands it is listed line by line. E.g: w can have a faked output that displays
other users that do not actually exist.
Proposed Methodology / Approach
Actions:
● Insult: This action insults the attacker, and each attacker gets geo-localized via their IP
address and an insult message stored in the database in the native language will be printed on
the shell. The command will not get executed. This action mainly serves as reverse Turing
Test. The purpose of such a test is to discover whether an action is being performed by a
human being or an automated tool. E.g: An attacker has downloaded a customized tool and
wants to execute it. GASH could reply: Is this all what you want to do?
● Delay: This action intends to delay the execution of a command. Its utility resides in the fact
that attackers might consider the system being exhausted and will try to download other tools
that might have less resources usage, giving us more information about the methods and tools
that attackers use. Implementing this action would be equivalent to a sleep line code with a
specific interval in the loop which upon its expiration, the command is executed.
Proposed Methodology / Approach
Logical Dataflow:
● This RL model has been pre-trained on existing datasets which have also
already been pre-processed
Logical Dataflow:
● GASH now sends this decision as well as the attacker’s input data to the
backend OpenAI API
Logical Dataflow:
● This logfile is then sent to the live monitoring service (web server)
through which admins can gain insight into attacker behaviour
Proposed Methodology / Approach
Possible challenges:
- Training bias: GPT3.5 has only been trained with data up to 2021.The impact
of this cutoff is that any bias present in the training data will be inherited by
the model such as outdated log contents or lack of modern interactions.
Architecture
Characteristics:
Expertise: Users must possess cybersecurity, network administration, or
security analysis skills to manage GASH effectively.
Technical Proficiency: Strong understanding of network protocols,
vulnerabilities, and attack techniques is required for interpreting GASH
reports and implementing countermeasures.
Analytical Skills: Proficiency in interpreting real-time monitoring data
and identifying threats is essential for proactive risk mitigation.
Architecture
Application Components:
Data Components:
Entity-Relationship Diagram
Design Description
External Interfaces:
● Attacker Interface: This is a simple interface exposed to the internet.
Potential attackers will interact with GASH through this interface. They
can submit commands or attempt various attacks. This interface should be
designed to be deceptive, mimicking a real system but not revealing any
sensitive details about the actual underlying system.
External Interfaces
● OpenAI API: GASH interacts with OpenAI's API to generate responses that
are tailored to the attacker's input and the RL model's decision. This API is
external to GASH and provides functionalities for creative text generation.
● System administrators can access this service to gain insights into attacker
behavior and identify potential threats.
Technologies Used
Tools and Libraries: Python 3.10 onwards with libraries like scapy for
packet manipulation, and other relevant tools for network monitoring
and analysis like Wireshark 4.0 onwards
Provide
• The timelines for execution of the project through Gantt
chart.
• The plan in terms of efforts by individuals in the team.
• Mention the tasks involved in different stages.
Conclusion
2. Harry Doubleday, Leandros Maglaras and Helge Janicke, “SSH Honeypot: Building, Deploying
and Analysis” International Journal of Advanced Computer Science and Applications(ijacsa),
7(5), 2016. http://dx.doi.org/10.14569/IJACSA.2016.070518
3. A. Pauna and I. Bica, "RASSH - Reinforced adaptive SSH honeypot," 2014 10th International
Conference on Communications (COMM), Bucharest, Romania, 2014, pp. 1-6, doi:
10.1109/ICComm.2014.6866707. https://ieeexplore.ieee.org/document/6866707
4. A. Pauna, A. -C. Iacob and I. Bica, "QRASSH - A Self-Adaptive SSH Honeypot Driven by
Q-Learning," 2018 International Conference on Communications (COMM), Bucharest,
Romania, 2018, pp. 441-446, doi: 10.1109/ICComm.2018.8484261.
https://ieeexplore.ieee.org/abstract/document/8484261
References
5. Á. Balogh, M. Érsok, A. Bánáti and L. Erdődi, "Concept for real time attacker profiling with
honeypots, by skill based attacker maturity model," 2024 IEEE 22nd World Symposium on Applied
Machine Intelligence and Informatics (SAMI), Stará Lesná Slovakia, 2024, pp. 000175-000180, doi:
10.1109/SAMI60510.2024.10432876 https://ieeexplore.ieee.org/document/10432876
8. M. Boffa, G. Milan, L. Vassio, I. Drago, M. Mellia and Z. Ben Houidi, "Towards NLP- based
Processing of Honeypot Logs," 2022 IEEE European Symposium on Security and Privacy
Workshops (EuroS&PW), Genoa, Italy, 2022, pp. 314-321, doi:
10.1109/EuroSPW55150.2022.00038. https://ieeexplore.ieee.org/document/9799396
10. K. Ramakrishnan, P. Gokul and R. Nigam, "Pandora: An IOT based Intrusion Detection Honeypot
with Real-time Monitoring," 2021 International Conference on Forensics, Analytics, Big Data, Security
(FABS), Bengaluru, India, 2021, pp. 1-7, doi: 10.1109/FABS52071.2021.9702656.
https://ieeexplore.ieee.org/document/9702656
References
11. Provos, Niels & Mcnamee, Dean & Mavrommatis, Panayiotis & Wang, ke & Google, Nagendra. (2007).
The Ghost In The Browser Analysis of Web-based Malware.
https://www.researchgate.net/publication/228632321_The_Ghost_In_The_Browser_Analysis_of_Web-base
d_Malware
12. Touch, S.; Colin, J.-N. A Comparison of an Adaptive Self-Guarded Honeypot with Conventional
Honeypots. Appl. Sci. 2022, 12, 5224. https://doi.org/10.3390/app12105224 https://www.mdpi.com/1641818
13. D. Fraunholz, M. Zimmermann and H. D. Schotten, "An adaptive honeypot configuration, deployment
and maintenance strategy," 2017 19th International Conference on Advanced Communication Technology
(ICACT), PyeongChang, Korea (South), 2017, pp. 53-57, doi: 10.23919/ICACT.2017.7890056.
https://ieeexplore.ieee.org/document/7890056
14. B. Wang, Y. Dou, Y. Sang, Y. Zhang and J. Huang, "IoTCMal: Towards A Hybrid IoT Honeypot for
Capturing and Analyzing Malware," ICC 2020 - 2020 IEEE International Conference on Communications
(ICC), Dublin, Ireland, 2020, pp. 1-7, doi: 10.1109/ICC40277.2020.9149314.
https://ieeexplore.ieee.org/document/9149314
Thank
You