International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 6, December 2014, pp. 848~857 ISSN: 2088-8708 848 Journal homepage: http://iaesjournal.com/online/index.php/IJECE A New Procedure to Detect Low Interaction Honeypots Eleazar Aguirre-Anaya 1 , Gina Gallegos-Garcia 2 , Nicolás Solano Luna 3 , Luis Alfonso Villa Vargas 4 1, 4 Center for Research in Computing 2, 3 Department of Research and Graduate Studies, Electrical and Mechanical Engineering School Instituto Politécnico Nacional, Mexico City, Mexico Article Info ABSTRACT Article history: Received Sep 21, 2014 Revised Nov 14, 2014 Accepted Nov 22, 2014 Honeypots systems are an important piece of the network security infrastructure and can be deployed to accomplish different purposes such as: network sensing, capturing and learning about 0-day exploits, capturing and analyzing of black hat techniques, deterring black hats and data gathering for doing statistical analysis over the Internet traffic, among others. Nevertheless, all honeypots need to look like real systems, due to if a honeypot is unmasked, it loses its value. This paper presents a new procedure to detect low interaction honeypots, through HTTP request, regardless honeypot architecture. It is important to mention that Low Interaction Honeypots network services need to be improved in order to get trustworthy information. Otherwise, it should consider data obtained by low interaction honeypots like inaccurate and unreliable information. Keyword: Fingerprint Honeypot Systems Low interaction Remote Network Systems Signatures Copyright © 2014 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Gina Gallegos-Garcia, Department of Research and Graduate Studies, Electrical and Mechanical Engineering School – Instituto Politécnico Nacional. Av. Sta Ana 1000. Sn. Fco. Culhuacan. Coyoacán. 04430. Mexico City, Mexico. Email: ggallegosg@ipn.mx 1. INTRODUCTION Nowadays, honeypots systems are important components in the organization’s whole security infrastructure. They can be used to help sense and mitigate security events. In [1], the author gives the de facto definition: 'A honeypot is a security resource whose value lies on being probed, attacked and compromised'. However, if a honeypot is detected, it loses all its value. In other words, if honeypots were susceptible to be detected, the Black hat Community could post a list of known honeypots systems letting others black hats avoid those systems and focus on real systems. Honeypot systems are used to research over malware propagation and new intrusion techniques used by black hats. They can give the possibility to detect and analyze 0-day exploits or to obtain information related to malware such as: propagation methods or even their source code. Moreover, a honeypot could act like an alarm system because any received connection, from a host inside organizational network, is an unequivocal indication that information security mechanisms have been evaded or there is an insider attacker. This information could be used to design contention methods against malware, to improve network security mechanism, to define new security policies or change some of them. Additionally to that, the managers could take better IT decisions to search about security infrastructure or to deploy new IT services for clients and partners of each organization. However, it is an important task to keep honeypot systems unidentified in order to collect information from the network and reach its goals. Nowadays, honeypot's remote detection is not an easy task because the detection of uncommon environments depends on the black hat’s skills. In example, detecting a decrease in the speed of the returning packets over the network, a limited amount of commands in the service or the operating system, limited