HoneyWin: high-interaction windows honeypot in enterprise environment

Conference paper


Aung, Y., Khoo, Y., Zheng, D., Duo, B., Chattopadhyay, S., Zhou, J., Lu, L. and Goh, W. 2025. HoneyWin: high-interaction windows honeypot in enterprise environment. The 2025 8th IEEE Conference on Dependable and Secure Computing. Taipei, Taiwan 18 - 20 Oct 2025 IEEE.
AuthorsAung, Y., Khoo, Y., Zheng, D., Duo, B., Chattopadhyay, S., Zhou, J., Lu, L. and Goh, W.
TypeConference paper
Abstract

Windows operating systems are often the primary targets of malware and ransomware attacks. With 93% of the ransomware targetingWindows-based systems, there is an urgent need for advanced defensive mechanisms to detect, analyze, and mitigate threats effectively. This paper proposes HoneyWin a high-interaction Windows honeypot that mimics an enterprise IT environment. The HoneyWin consists of three Windows 11 endpoints and an enterprise-grade gateway provisioned with comprehensive network traffic capturing, host-based logging, deceptive tokens, endpoint security and real-time alerts capabilities. The HoneyWin has been deployed live in the wild for 34 days and receives more than 5.79 million unsolicited connections, 1.24 million login attempts, 5 and 354 successful logins via remote desktop protocol (RDP) and secure shell (SSH). The adversary interacted with the deceptive token in one of the RDP sessions and exploited the public-facing endpoint to initiate the Simple Mail Transfer Protocol (SMTP) brute-force bot attack via SSH sessions. The adversary successfully harvested 1,250 SMTP credentials after attempting 151,179 credentials during the attack.

KeywordsHigh-Interaction Windows Honeypot; Deception; Network Traffic Analysis; Host Log Analysis; Attack Attribution
Year2025
ConferenceThe 2025 8th IEEE Conference on Dependable and Secure Computing
PublisherIEEE
Web address (URL)https://attend.ieee.org/dsc-2025/
Accepted author manuscript
License
File Access Level
Restricted
File
File Access Level
Restricted
Output statusIn press
Publication process dates
Deposited31 Oct 2025
Permalink -

https://repository.derby.ac.uk/item/v0504/honeywin-high-interaction-windows-honeypot-in-enterprise-environment

  • 10
    total views
  • 4
    total downloads
  • 9
    views this month
  • 0
    downloads this month

Export as

Related outputs

LAPIS: Layered anomaly detection system for IoT security
Wang, C., Aung, Y., Dong, Y., Limbasiya, T. and Zhou, J. 2025. LAPIS: Layered anomaly detection system for IoT security. 7th International Workshop on 
Artificial Intelligence and IoT Security (AIoTS). Munich, Germany 23 - 26 Jun 2025 Springer.
CANDIDS: CAN/CAN-FD deep learning-based intrusion detection systems
Aung, Y., Cahyadi, W. and Zhou, J. 2025. CANDIDS: CAN/CAN-FD deep learning-based intrusion detection systems. 11th ACM Cyber-Physical System Security Workshop (CPSS 2025). Hanoi, Vietnam 26 - 26 Aug 2025 ACM. https://doi.org/10.1145/3709017.3737713