Honeypots Aiding Network Forensics: Challenges and Notions

نویسندگان

  • Qassim Nasir
  • Zahraa A. Al-Mousa
چکیده

risks as attacks are increasing day after day. Network forensics is the process of investigation such attacks through analyzing network data and events. Many challenges are facing investigators due to the rapid growing of network scale and intruders’ skills. Honeypots are computer traps that are meant to be compromised to attract hackers and monitor their strategies and tools. Using honeypots provides a cost-effective solution to increase the security of an organization. Monitoring malicious traffic is useful for network forensics and intrusion detection systems. This paper focused on studying network forensics methodologies and tools in addition to developing a well understanding of honeypots terminologies and their value in network forensics. Honeypot tools differ in several aspects discussed here in an objective comparison. Moreover, Honeypots efficiency is evaluated versus network intrusion detection and prevention system (IDPS). Data received by traditional network tools can be correlated with honeypots captures to obtain more valuable evidence and clues. The study also provides a literature review of previous researches on honeypots aid to network forensics in addition to multiple recommendations to overcome honeypot limitations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Design of Network Security Projects Using Honeypots

Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowaday...

متن کامل

Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses

This paper deals with the basic aspects of Honeypots, their use in modern computer networks and their implementation in educational environments. Initially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. Next, the paper explains the different types and functions of Ho...

متن کامل

Is Honeyd Effective or Not?

Honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. This paper describes the framework of how to improve the effectiveness of honeypots through the effective use of deception. In this research a legitimate corporate deceptive network is cr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCM

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013