Honeypot: Concepts, Types and Working

In couple of decades number of attacks on IT organization has increased. Among them small and medium sized organization’s risk is higher because of lower security architecture in their system. Attackers use SQL injection and XSS type of attacks to exploit the vulnerability of the system or the organization. A mechanism which is created to learn about the attackers’ method of attack and pattern and also used to get useful information about the intrusive activity is Honeypot. Honeypots can be classified according to the level of interaction as low-interaction, medium-interaction, highinteraction and the purposed for which it is used as research honeypot and production honeypot. Detailed study about the types of honeypot is included in this paper. Various honeypot results are enlisted in this paper to show that how honeypot works in real-time environment and how it responds when any unwanted activity occurs in the network.

[1]  Rayford B. Vaughn,et al.  Experiences with Honeypot Systems: Development, Deployment, and Analysis , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[2]  Hassan Artail,et al.  A dynamic honeypot design for intrusion detection , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..

[3]  Ankit D. Patel,et al.  Dynamic & hybrid honeypot model for scalable network monitoring , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[4]  Zhiguang Qin,et al.  Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[5]  Baskoro Adi Pratomo,et al.  Aggressive web application honeypot for exposing attacker's identity , 2014, 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering.

[6]  Jian Bao,et al.  Research on network security of defense based on Honeypot , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[7]  Yun Yang,et al.  Design and implementation of distributed intrusion detection system based on honeypot , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[8]  Wei Huang,et al.  A new type of intrusion prevention system , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.

[9]  Iyatiti Mokube,et al.  Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.