Deception Technique Used in Cyber Security (Honeypots)
Keywords:
Cyber Security, Honeypots, Advanced Persistent Threats, DBIRAbstract
Our cyber world is going to converge in a very rapid manner, all the data and information is presented in digital format. As everything is on computers attackers easily predicts the information and attack the computer system. Here in this paper, we are going to discuss what ways deception play a most important in cyber security. Computer breaches can be prevented through this deception technique. .Honeypot used as a deception technique to prevent computer attacks. In this Paper we will discuss Advantages and limitation of this deception technique.
References
- Verizon,"Threats on the Horizon-The Rise of the Advanced Persistent Threat." http://www.verizonenterprise.com/DBIR/.
- J. J. Yuill, Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. PhD Dissertation, North Carolina State University, 2006.
- B. Cheswick,"An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied,"in Proceedings of Winter USENIX Conference, (San Francisco), 1992.
- C. P. Stoll, The Cuckoo’s Egg: Tracing a Spy through the Maze of Computer Espionage. Doubleday, 1989.
- E. H. Spafford,"More than Passive Defense." http://goo.gl/5lwZup, 2011.
- L. Spitzner, Honeypots: Tracking Hackers. Addison-Wesley Reading, 2003
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.