Dynamic Honeypot Construction

System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught of attacks. Honeypots provide a valuable tool to collect information about the behaviors of attackers in order to design and implement better defenses, but most current configurations are static setups consisting of either lowinteraction or high-interaction environments. Although static honeypots help address this issue, the ability to construct dynamic honeypots easily would enable security personnel to identify potential security vulnerabilities in the attempt to build better defenses. This research effort describes a method to automatically and dynamically configure honeypots based on the results of network scans. These dynamically constructed honeypots then emulate a system or network of systems in order to collect information to better protect that network. This dynamic honeypots configuration methods has been implemented and tested, and can now enhance the ability of system administrators to identify system vulnerabilities. Index terms – Honeypots, dynamic honeypots,

[1]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[2]  Jeff L. Hieb Anomaly based intrusion detection for network monitoring using a dynamic honeypot. , 2004 .

[3]  Hassan Artail,et al.  A dynamic honeypot design for intrusion detection , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..