Open Access   Article Go Back

An Overview of Honeypot Systems

Neha Titarmare1 , Nayankumar Hargule2 , Anand Gupta3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 394-397, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.394397

Online published on Feb 28, 2019

Copyright © Neha Titarmare, Nayankumar Hargule, Anand Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Neha Titarmare, Nayankumar Hargule, Anand Gupta, “An Overview of Honeypot Systems,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.394-397, 2019.

MLA Style Citation: Neha Titarmare, Nayankumar Hargule, Anand Gupta "An Overview of Honeypot Systems." International Journal of Computer Sciences and Engineering 7.2 (2019): 394-397.

APA Style Citation: Neha Titarmare, Nayankumar Hargule, Anand Gupta, (2019). An Overview of Honeypot Systems. International Journal of Computer Sciences and Engineering, 7(2), 394-397.

BibTex Style Citation:
@article{Titarmare_2019,
author = {Neha Titarmare, Nayankumar Hargule, Anand Gupta},
title = {An Overview of Honeypot Systems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {394-397},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3675},
doi = {https://doi.org/10.26438/ijcse/v7i2.394397}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.394397}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3675
TI - An Overview of Honeypot Systems
T2 - International Journal of Computer Sciences and Engineering
AU - Neha Titarmare, Nayankumar Hargule, Anand Gupta
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 394-397
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
607 306 downloads 132 downloads
  
  
           

Abstract

In today’s world, network security is a very crucial issue. Providing security to the network, services is a major concern these days. Therefore, in this paper we study the concept of Honeypots. A Honeypot is a fake system which lures the attackers. The attackers give in to the temptation and launch attacks. Such attacks help the researchers and organization to study the attack patterns and gain vital information about the attackers. A honeypot is only meant to tantalize the intruders, attackers to perform the malicious activity which results in revealing information about attacks. Thereby, honeypots are quite useful in preventing and counter attacking various types of attacks. We can build Honeynet, Honeywalls using the concept of Honeypots. In this paper, we focus on the concept of Honeypot systems and represent the various aspects of honeypots. We also discuss the various types of honeypots along with its advantages and disadvantages. We also focus on the concepts of Honeynet and Honeywalls.

Key-Words / Index Term

Honeypot, Honeynet, Honeywalls, Intruders

References

[1] William Stallings “Cryptography and Network Security Principles and Practices” Prentice Hall Publication, pp. 581, 2005.
[2] Lance Spitnzer “Honeypots: Tracking Hackers” Addison Wisley Longman Publishing Co.in, 2002.
[3] Liu Dongxia, Zhang Yongbo, “An Intrusion Detection System Based on Honeypot Technology” , In the Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE2012), Hangzhou, pp. 451-454.
[4] Tao, Jing. Immune-based intrusion prevention model [J]. Network and Information, 200907
[5] Peng Hong, Wang Cong, Guan Xin “Intrusion Prevention System in the Network of Digital Mine” 2nd International Conference on Computer Engineering and Technology, Volume 6, pp. 296-299, 2010.
[6] M. Sqalli, R. AlShaikh, E. Ahmed “Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study” UKSim Fourth European Modeling Symposium on Computer Modelling and Simulation.pp. 316-321, 2010
[7] Ariel Bar, Bracha Shapira, Lior Rokach and Moshe Unger, “Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis” IEEE International Conference on Software Science, Technology and Engineering , pp. 28-36, 2016.
[8] Thesis on “Honeypots in Network Security” by Deniz Akkaya- Fabien Thalgott, School of Computer Science, Physics and Mathematics, Linnaeus University, 29th June 2010.
[9] Gérard Wagener. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour” Computer Science [cs]. Institut National Polytechnique de Lorraine - INPL, 2011. English.
[10] Jules Pagna Disso, Kevin Jones, Steven Bailey, “A Plausible Solution SCADA Security: Honeypot Systems”Eighth International Conference on Broadband, Wireless Computing, Communication and Applications,pp. 443-448, 2013.
[11] Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, Khaled Salah, “Identifying Scanning Activities in Honeynet Data using Data Mining” Third International Conference on Computational Intelligence, Communication Systems and Networks, pp. 178-183, 2011.
[12] A. Mairh, et al., Honeypot in network security: a survey, In: Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, 2011. p. 600-605.
[13] L. Spitzner, Honeypots: Catching the insider threat, In: Computer Security Applications Conference 2003, Proceedings. 19th Annual. IEEE, 2003. p. 170-179, 2003
[14] Dissertation on “Deception Techniques Using Honeypots” by Amit D. Lakhani, Information Security Group Royal Holloway, University of London, UK.
[15] Keith Harrison, James R. Rutherford, and Gregory B. White “The Honey Community: Use of Combined Organizational Data for Community Protection” 48th Hawaii International Conference on System Sciences, pp. 2288-2297, 2015.