skip to main content
10.1145/1947940.1948065acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccsConference Proceedingsconference-collections
research-article

Honeypot in network security: a survey

Authors Info & Claims
Published:12 February 2011Publication History

ABSTRACT

In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we also defines the use of signature technique in honeypot for traffic analysis. In the end we summarizes all these aspects.

References

  1. Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23--24, 2007, Winston-Salem, North Carolina, USA, pp. 321--325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Aaron Lanoy and Gordon W. Romney, Senior Member, IEEE {2006} A Virtual Honey Net as a Teaching ResourceGoogle ScholarGoogle Scholar
  4. F. A. Shuja. (2005, November). Virtual Honeynet: Deploying Honeywall using VMware, Pakistan Honeynet Project {Online}, Available: http://www.honeynet.org.pk/honeywall/roo/Google ScholarGoogle Scholar
  5. (2005, August). Know Your Enemy: Honeywall CDROM Roo 3rd Generation Technology, Honeynet Project & Research Alliance, {Online} Available: http://www.honeynet.org, Last Modified: 17 August, 2005.Google ScholarGoogle Scholar
  6. G. Romney, et al., "A Teaching Prototype for Educating IT Security Engineers in Emerging Environments," Presented at the IEEE ITHET 2004 Conference in Istanbul, Turkey, June 2, 2004. Published in IEEE Xplore.Google ScholarGoogle Scholar
  7. Cliaord Stoll. Stalking the Wily Hacker. Communications of the ACM. pp 484--497. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ram Kumar Singh & Prof. T. Ramanujam. Intrusion Detection System Using Advanced Honeypots, 2009Google ScholarGoogle Scholar
  9. Martin Roesch, Snort- Lightweight Intrusion Detection for Networks, Proceedings of LISA'99: 13th System Administration Conference, Seattle, Washington USA, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. The Honeynet Project. Know Your Enemy: Honeynets (May 2005) http://www.honeynet.org/papers/honeynet/.Google ScholarGoogle Scholar
  11. Honeynet Research Alliance. Project Honeynet Website. Retrieved May 16th 2003 from the World Wide Web: http://project.honey.orgGoogle ScholarGoogle Scholar
  12. Brian Scottberg et-al. Internet Honeypot: Protection or Entrapment, 2002.Google ScholarGoogle Scholar
  13. The Honeynet Project, Know Your Enemy: Honeynets, April 2001.Google ScholarGoogle Scholar
  14. The Honeypot Project, Know Your Enemy: Revealing the Security tools, tactic, and motives of Blackhats community. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hybrid Honeypot System for Network Security by Kyi Lin Lin Kyaw, 2008.Google ScholarGoogle Scholar
  16. Spitzer, Lance. Honeypots, Tracking Hackers. Pdf version. Addison Wesely, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Honeynet project, The. (2007a). Know your enemy: Honeynets. Retrieved on 7 October 2007 from http;//www.Honeynet.org/papers/honeynet/index.htmlGoogle ScholarGoogle Scholar
  18. Research infrastructures action, Sixth framework programme, D1.1: Honeypot Node Architecture, page 7--24.Google ScholarGoogle Scholar
  19. Research infrastructures action, Sixth framework programme, D1.4: Architecture Integration, page 36.Google ScholarGoogle Scholar
  20. Honeycomb. Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft.Google ScholarGoogle Scholar
  21. V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23--24, pp. 2435.2463, 1998. {Online}. Available: http://citeseer.nj.nec.com/article/paxson98bro.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Roesch, Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on Systems Administration, 1999, pp. 229.238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Provos, Honeyd - A Virtual Honeypot Daemon, in 10th DFN-CERT Workshop, Hamburg, Germany, February 2003.Google ScholarGoogle Scholar
  24. Provos N. and Holz T. 2007, Virtual Honeypots: From Botnets Tracking to Instrusion Detection, Addision Wesley Professional Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Honeypot in network security: a survey

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & Security
      February 2011
      656 pages
      ISBN:9781450304641
      DOI:10.1145/1947940

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 February 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader