A Guide to the Honeypot Concept
نویسنده
چکیده
Most security technologies are designed to prevent unauthorized activity to resources; systems are put into place as a defensive measure. The honeypot concept takes a more proactive stance by doing the opposite and attracting intruders. It allows them to bring out their best bag of tricks, all the while taking note of their moves and how their tools work. The purpose of this paper is to give a complete overview of the honeypot concept by not only defining what a honeypot is but also describing the different types, objectives, and implementations. It will discuss the implementation and strategies of honeypots as well as the advancem nts in the technology. Additionally, it will examine some of the legal issues that may surface by deploying a honeypot. This paper should be used to get a basic understanding of the honeypot concept, its terminology and to open the door for further research by the reader.
منابع مشابه
A Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملHoneypot based Secure Network System
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection b...
متن کاملThe Model and Simulation of the Invulnerability of Scale-free Networks Based on "Honeypot"
The frangibility of the scale-free networks under intentional attack is very obvious. In order to study the invulnerability of scale-free networks under intentional attack, the study bring forwards to applying the “honeypot” concept of internet’s safety to scale-free networks. Over random simulated method, a few “honeypot node” as low as 2.5% in scale-free networks can improve the invulnerabili...
متن کامل