fore, we varied the buffer size from 16 Bytes up to
8192 Bytes. Table 2 shows the number of detected
samples for different shellcode buffer sizes. A buffer
size of at least 31 bytes was needed to detect the first
sample. Increasing the buffer size up to 32 bytes was
sufficient to detect 12 shellcode samples. Even with
bigger buffer sizes up to 8192 Bytes, libemu detected
at most 26 malware samples.
6 SUMMARY
Attack detection in IPv6 networks is still in an early
stage. Currently, there are only two general pur-
pose low-interaction honeypots available: Dionaea
and HoneydV6.
Shellcode detection in low-interaction honeypots
is an important feature for network health monitoring
and zero-day attack detection. Dionaea already pro-
vides an integrated shellcode detection mechanism.
However,since Dionaea can not be usefully applied to
very large IPv6 networks, we decided to extend Hon-
eydV6 with a similar shellcode detection component.
We achieved this goal by integrating the open-
source detection library libemu into HoneydV6. Be-
yond the detection and extraction of shellcode bina-
ries, we integrated the online malware analysis ser-
vice Anubis into HoneydV6 to allow an advanced pro-
filing of malware samples.
In our evaluation, we compared the shellcode de-
tection rate of Dionaea and HoneydV6. Since both
honeypots are using the same shellcode detection li-
brary libemu, we expected a similar detection rate
for both honeypots. We found that Dionaea detected
about 6%, while HoneydV6 can detect about 25% of
all our generated malware samples. This difference in
the detection rates can be explained by an additional
profiling mechanism only present in Dionaea, which
is used as an additional alert filter criteria.
What is noticeable, though, is the general low de-
tection rate for shellcode attacks. This shows that
there is still a lack of more advanced open-source
shellcode detection libraries that could mitigate these
kind of network attacks.
Still it is not possible to inspect traffic that is en-
crypted on service layer. This problem can be partly
solved by extending HoneydV6 with an internal TLS
implementation so that HoneydV6 is responsible for
encrypting and decrypting the communication and
therefore keeps control also over the encrypted com-
munication.
REFERENCES
Anubis (nd). Anubis: Analyzing Unknown Binaries. Avail-
able from: http://anubis.iseclab.org.
Baecher, P. and Koetter, M. (nd). libemu –
x86 Shellcode Emulation. Available from:
http://libemu.carnivore.it/.
Beale, J., Baker, A. R., Esler, J., and Northcutt, S. (2007).
Snort: IDS and IPS toolkit. Jay Beale’s open source
security series. Syngress.
Dionaea (nd). dionaea catches bugs. Available from:
http://dionaea.carnivore.it/.
Fratantonio, Y., Kruegel, C., and Vigna, G. (2011). Shel-
lzer: A tool for the dynamic analysis of malicious
shellcode. In Proceedings of the 14th International
Conference on Recent Advances in Intrusion De-
tection, RAID’11, pages 61–80, Berlin, Heidelberg.
Springer-Verlag.
Honeyd (nd). Honeyd Virtual Honeypot. Available from:
http://www.honeyd.org.
kippo (nd). kippo - SSH Honeypot. Available from:
https://code.google.com/p/kippo/.
Malwr (nd). Malwr - Malware Analysis by Cuckoo Sand-
box. Available from: https://malwr.com.
McCanne, S. and Jacobson, V. (nd). tcpdump & libpcap.
Available from: http://www.tcpdump.org/.
Metasploit (nd). Metasploit: Penetration Testing Software.
Available from: http://www.metasploit.com.
Netcat (nd). The GNU Netcat project. Available from:
http://netcat.sourceforge.net.
Polychronakis, M., Anagnostakis, K. G., and Markatos,
E. P. (2006). Network level polymorphic shell-
code detection using emulation. In Proceedings
of the Third International Conference on Detection
of Intrusions and Malware & Vulnerability Assess-
ment, DIMVA’06, pages 54–73, Berlin, Heidelberg.
Springer-Verlag.
Sandbox, C. (nd). Cuckoo Sandbox. Available from:
http://www.cuckoosandbox.org.
Schindler, S., Schnor, B., Kiertscher, S., Scheffler, T., and
Zack, E. (2013). HoneydV6: A low-interaction IPv6
honeypot. In Proc. of the 10th International Confer-
ence on Security and Cryptography (SECRYPT 2013),
Reykjavik, Iceland.
Spitzner, L. (2002). Honeypots: Tracking Hack-
ers. Addison-Wesley Longman Publishing Co., Inc.,
Boston, MA, USA.
Sz¨or, P. and Ferrie, P. (2001). Hunting for metamorphic. In
In Virus Bulletin Conference, pages 123–144.
ShellcodeDetectioninIPv6NetworkswithHoneydV6
205