ABSTRACT
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A honeypot is a security resource whose value lies in being probed, attacked or compromised. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology. We examine different kinds of honeypots, honeypot concepts, and approaches to their implementation.
- Know Your Enemy: Honeynets. http://www.honeynet.org/papers/kye.html.Google Scholar
- SANS Institiute GIAC Certification GSEC Assignment#1.4: Honey Pots-Strategic Considerations, 2002.Google Scholar
- Wikipedia. http://en.wikipedia.org/wiki/Honeypot_(computing).Google Scholar
- Baumann, R. and Plattner, C. White Paper: Honeypots, Swiss Federal Institute of Technology, Zurich, 2002.Google Scholar
- Gubbels, K. Hands in the Honeypot GIAC Security Essentials Certification (GSEC), 2002.Google Scholar
- Harrison, J. Honeypots, the Hottest Thing in Intrusion Detection. http://www.channelinsider.com/article/Honeypots+the+ Hottest+Thing+in+Intrusion+Detection/111384_1.aspx eWeek Channel Insider, 2003.Google Scholar
- http://www.honeypots.net/.Google Scholar
- Jones, J. K. and Romney, G. W. Honeynets: An Educational Resource for IT Security SIGITE '04, Salt Lake City, Utah, 2004. Google ScholarDigital Library
- Kabay, M. E. Honeypots, Part 2: Do honeypots constitute entrapment? Network World, 2003.Google Scholar
- Karthik, S., Samudrala, B. and Yang, A. T. Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges, 20 (4). Google ScholarDigital Library
- Kreibich, C. and Crowcroft, J. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets II), Boston, 2003, 51--56.Google Scholar
- Martin, W. W. Honeypots and Honeynets - Security through Deception. http://www.sans.org/reading_room/whitepapers/attackin g/41.php, SANS Institute, 2001, As Part of the Information Security Reading Room.Google Scholar
- Provos, N. Honeypot Background. http://www.honeyd.org/background.php.Google Scholar
- Spitzner, L. The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy, 1 (2). 15--23. Google ScholarDigital Library
- Spitzner, L. Honeypots: Tracking Hackers. Addison-Wesley Pearson Education, Boston, MA, 2002. Google ScholarDigital Library
- Spitzner, L. Honeytokens: The Other Honeypot. http://www.securityfocus.com/infocus/1713, Security Focus, 2003.Google Scholar
- Spitzner, L. Open Source Honeypots: Learning with Honeyd, Security Focus, 2003.Google Scholar
- Spitzner, L. The Value of Honeypots, Part One: Definitions and Values of Honeypots, Security Focus, 2001.Google Scholar
- Sutton Jr., R. E. DTEC 6873 Section 01: How to Build and Use a Honeypot.Google Scholar
- Talabis, R. Honeypots 101: Risks and Disadvantages, 2.Google Scholar
Recommendations
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityIndustrial Control Systems (ICS) provide management and control capabilities for mission-critical utilities such as the nuclear, power, water, and transportation grids. Within ICS, Programmable Logic Controllers (PLCs) play a key role as they serve as a ...
Honeycomb: creating intrusion detection signatures using honeypots
This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network ...
SIPHON: Towards Scalable High-Interaction Physical Honeypots
CPSS '17: Proceedings of the 3rd ACM Workshop on Cyber-Physical System SecurityIn recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we propose the SIPHON architecture---a Scalable high-Interaction Honeypot platform for IoT devices. Our ...
Comments