Development of a single honeypot system interface

Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization's security level. Perpetrators of cybercrime will take this advantage to exploit other systems in their network. To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network. This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks. Technically, this paper will guide user in Honeypot configuration process.

[1]  Shiva Azadegan,et al.  Development of a Honeynet Laboratory: a Case Study , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[2]  Gordon W. Romney,et al.  Honeynets: an educational resource for IT security , 2004, CITC5 '04.

[3]  Honeypots,et al.  Honeypots Definitions and Value of Honeypots , .

[4]  Zhiguang Qin,et al.  Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[5]  Kyi Lin Lin Kyaw Hybrid Honeypot System for Network Security , 2008 .

[6]  Antanas Cenys,et al.  Development of Honeypot System Emulating Functions of Database Server , 2004 .