Honeypot : A Trap for Attackers
DOI:
https://doi.org/10.32628/CSEIT217142Keywords:
Honeypot, Honeynet, Cyber-Security, IDS, IPS.Abstract
A honey-pot is a type of toolkit used to deceive attackers, designed to detect an attacker attempting to compromise the production systems of any institute/organization. If designed and deployed correctly, a honeypot can act as an advance surveillance device and well as a threat intelligence gathering device. It is used to analyse the behavioural signature of the intruders trying to attack a system and to provide informational insights into potential system loop-holes.
References
- Spitzner, L. Open Source Honeypots: Learning with honeyd, Security Focus, 2003.
- Christian Doring, “Improving network security with honeypot.”
- The Government of the Hong Kong Special Administrative Region, “Honeypot security” February 2008.
- Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses
- http://project.honeynet.org/papers/individual/Doering.pdf 6. http://security.rbaumann.net/download/honeyd.pdf
- Setting Up And Running A Honeypot – Nepenthes,Brian Allen (ballen at wustl.edu) Network Security Analyst ,Washington University in St. Louis
- http://www.pixel-house.net/midinthp.pdf
- http://www.honeypots.net/.
- http://www.honeynet.org/papers/kye.html.
- http://www.honeyd.org/background.php.
- http://cs.millersville.edu/~csweb/lib/userfiles/honeypot.pdf
- Wikipedia. http://en.wikipedia.org/wiki/ Honeypot_(computing).
- Karthik, S., Samudrala, B. and Yang, A.T. Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges, 2004.
- Know your enemy Honeynets, http://www.honeynet.org/papers/key.html SANS institute GIEC certification GSEC Assignments#1.4:Honeypots Stretegic Considerations,2002.
- Kreibich, C. and Crowcroft, J. Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets II), Boston, 2003, 51-56.
- Martin, W.W. Honeypots and Honeynets – Security through Deception. http://www.sans.org/reading_room/whitepapers/attackin g/41.php, SANS Institute, 2001, As Part of the Information Security Reading Room.
- John Carroll, Computer Security, 3rd ed., Butterworth-Heinemann, 1997.
- Provos, Honeypot Background. http://www.honeyd.org/background.php.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.