A survey of honeypot research: Trends and opportunities

The number of devices connected to computer networks is increasing daily, and so is the number of network-based attacks. A honeypot is a system trap that is set to act against unauthorised use of information systems. The objective of this study was to survey the emergent trends in extant honeypot research with the aims of contributing to the knowledge gaps in the honeypot environment. The relevant literature was identified from a myriad of sources, such as books, journal articles, reports, et cetera. The findings suggest that honeypots are attracting the interest of researchers as a valuable security technique that can be implemented to mitigate network attacks and provides an opportunity to learn more about the nature of these attacks. Consequently a honeypot can be used as a research tool to gather data about network attacks.

[1]  Shiva Azadegan,et al.  Use of honeynets in computer security education , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[2]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[3]  James Wong COMPUTER SCIENCE DEPARTMENT , 1971 .

[4]  Anjali Sardana,et al.  Honeypots: A New Paradigm to Information Security , 2011 .

[5]  William Yurcik,et al.  Internet honeypots: protection or entrapment? , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).

[6]  Iyatiti Mokube,et al.  Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.

[7]  Jérémy Briffaut,et al.  Security and Results of a Large-Scale High-Interaction Honeypot , 2009, J. Comput..

[8]  Hiroshi Fujinoki,et al.  A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .

[9]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[10]  villpasc Computer Science Department , 2016 .

[11]  Thomas C. O'Guinn,et al.  brand community , 2022, The Fairchild Books Dictionary of Fashion.

[12]  W. Martin Honey pots and honey nets , Security through deception , 2001 .

[13]  Cristine Hoepers,et al.  Honeynets Applied to the CSIRT Scenario , 2003 .

[14]  K. Anagnostakis,et al.  Shadow Honeypots , 2009 .

[15]  R. Kozinets The Field behind the Screen: Using Netnography for Marketing Research in Online Communities , 2002 .

[16]  Vivek Sharma Use of Honeypots to Increase Awareness regarding Network Security , 2012 .

[17]  Xuxian Jiang,et al.  Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention , 2006, J. Parallel Distributed Comput..