Comparative Study of Different Honeypots System
نویسندگان
چکیده
–A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends and allow indepth examination of adversaries during and after exploitation of a honeypot. The concept of honeypots was first proposed in Clifford Stoll's book “The Cuckoo's Egg", and Bill Cheswick's paper “An Evening with Berferd”. Honeypots as an easy target for the attackers can simulate many vulnerable hosts in the network and provide us with valuable information of the attackers. Honeypots are not the solution to the network security but they are tools which are implemented for discovering unwanted activities on a network. They are not intrusion detectors, but they teach us how to improve our network security or more importantly, teach us what to look for. Honeypot is a system which is built and set up in order to be hacked. Except for this, honeypot is also a trap system for the attackers which is deployed to counteract the resources of the attacker and slow him down, thus he wastes his time on the honeypot instead of attacking the production systems. This paper discusses honeypots basics, types of honeypots, various honeypots, advantages and disadvantages of honeypots and the last section presents the comparison between different honeypots systems. Keywords––Honeypots, Honeyd, Specter, Network Security, Honeynet.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملData Collection and Data Analysis in Honeypots and Honeynets
Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...
متن کاملEmpirical studies based on Honeypots for Characterizing Attackers Behavior
Title of Document: EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR Bertrand Sobesto, Doctor of Philosophy, 2015 Directed By: Associate Professor Michel Cukier Reliability Engineering Program The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is discovered, it is diffic...
متن کامل