Honeypot : A Trap for Attackers

Authors

  • Syed Nasir Abas  Shaheed Udham Singh Group of Institutions, Tangori, Punjab, India
  • Er. Parvinder Kaur   Shaheed Udham Singh Group of Institutions, Tangori, Punjab, India

DOI:

https://doi.org/10.32628/CSEIT217142

Keywords:

Honeypot, Honeynet, Cyber-Security, IDS, IPS.

Abstract

A honey-pot is a type of toolkit used to deceive attackers, designed to detect an attacker attempting to compromise the production systems of any institute/organization. If designed and deployed correctly, a honeypot can act as an advance surveillance device and well as a threat intelligence gathering device. It is used to analyse the behavioural signature of the intruders trying to attack a system and to provide informational insights into potential system loop-holes.

References

  1. Spitzner, L. Open Source Honeypots: Learning with honeyd, Security Focus, 2003.
  2. Christian Doring, “Improving network security with honeypot.”
  3. The Government of the Hong Kong Special Administrative Region, “Honeypot security” February 2008.
  4. Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses
  5. http://project.honeynet.org/papers/individual/Doering.pdf 6. http://security.rbaumann.net/download/honeyd.pdf
  6. Setting Up And Running A Honeypot – Nepenthes,Brian Allen (ballen at wustl.edu) Network Security Analyst ,Washington University in St. Louis
  7. http://www.pixel-house.net/midinthp.pdf
  8. http://www.honeypots.net/.
  9. http://www.honeynet.org/papers/kye.html.
  10. http://www.honeyd.org/background.php.
  11. http://cs.millersville.edu/~csweb/lib/userfiles/honeypot.pdf
  12. Wikipedia. http://en.wikipedia.org/wiki/ Honeypot_(computing).
  13. Karthik, S., Samudrala, B. and Yang, A.T. Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges, 2004.
  14. Know your enemy Honeynets, http://www.honeynet.org/papers/key.html SANS institute GIEC certification GSEC Assignments#1.4:Honeypots Stretegic Considerations,2002.
  15. Kreibich, C. and Crowcroft, J. Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets II), Boston, 2003, 51-56.
  16. Martin, W.W. Honeypots and Honeynets – Security through Deception. http://www.sans.org/reading_room/whitepapers/attackin g/41.php, SANS Institute, 2001, As Part of the Information Security Reading Room.
  17. John Carroll, Computer Security, 3rd ed., Butterworth-Heinemann, 1997.
  18. Provos, Honeypot Background. http://www.honeyd.org/background.php.

Downloads

Published

2021-02-28

Issue

Section

Research Articles

How to Cite

[1]
Syed Nasir Abas, Er. Parvinder Kaur , " Honeypot : A Trap for Attackers" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 1, pp.238-243, January-February-2021. Available at doi : https://doi.org/10.32628/CSEIT217142