ABSTRACT
In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we also defines the use of signature technique in honeypot for traffic analysis. In the end we summarizes all these aspects.
- Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley. Google ScholarDigital Library
- Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23--24, 2007, Winston-Salem, North Carolina, USA, pp. 321--325. Google ScholarDigital Library
- Aaron Lanoy and Gordon W. Romney, Senior Member, IEEE {2006} A Virtual Honey Net as a Teaching ResourceGoogle Scholar
- F. A. Shuja. (2005, November). Virtual Honeynet: Deploying Honeywall using VMware, Pakistan Honeynet Project {Online}, Available: http://www.honeynet.org.pk/honeywall/roo/Google Scholar
- (2005, August). Know Your Enemy: Honeywall CDROM Roo 3rd Generation Technology, Honeynet Project & Research Alliance, {Online} Available: http://www.honeynet.org, Last Modified: 17 August, 2005.Google Scholar
- G. Romney, et al., "A Teaching Prototype for Educating IT Security Engineers in Emerging Environments," Presented at the IEEE ITHET 2004 Conference in Istanbul, Turkey, June 2, 2004. Published in IEEE Xplore.Google Scholar
- Cliaord Stoll. Stalking the Wily Hacker. Communications of the ACM. pp 484--497. 1988. Google ScholarDigital Library
- Ram Kumar Singh & Prof. T. Ramanujam. Intrusion Detection System Using Advanced Honeypots, 2009Google Scholar
- Martin Roesch, Snort- Lightweight Intrusion Detection for Networks, Proceedings of LISA'99: 13th System Administration Conference, Seattle, Washington USA, 2005 Google ScholarDigital Library
- The Honeynet Project. Know Your Enemy: Honeynets (May 2005) http://www.honeynet.org/papers/honeynet/.Google Scholar
- Honeynet Research Alliance. Project Honeynet Website. Retrieved May 16th 2003 from the World Wide Web: http://project.honey.orgGoogle Scholar
- Brian Scottberg et-al. Internet Honeypot: Protection or Entrapment, 2002.Google Scholar
- The Honeynet Project, Know Your Enemy: Honeynets, April 2001.Google Scholar
- The Honeypot Project, Know Your Enemy: Revealing the Security tools, tactic, and motives of Blackhats community. 2002. Google ScholarDigital Library
- Hybrid Honeypot System for Network Security by Kyi Lin Lin Kyaw, 2008.Google Scholar
- Spitzer, Lance. Honeypots, Tracking Hackers. Pdf version. Addison Wesely, 2002. Google ScholarDigital Library
- Honeynet project, The. (2007a). Know your enemy: Honeynets. Retrieved on 7 October 2007 from http;//www.Honeynet.org/papers/honeynet/index.htmlGoogle Scholar
- Research infrastructures action, Sixth framework programme, D1.1: Honeypot Node Architecture, page 7--24.Google Scholar
- Research infrastructures action, Sixth framework programme, D1.4: Architecture Integration, page 36.Google Scholar
- Honeycomb. Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft.Google Scholar
- V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23--24, pp. 2435.2463, 1998. {Online}. Available: http://citeseer.nj.nec.com/article/paxson98bro.html Google ScholarDigital Library
- M. Roesch, Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on Systems Administration, 1999, pp. 229.238. Google ScholarDigital Library
- N. Provos, Honeyd - A Virtual Honeypot Daemon, in 10th DFN-CERT Workshop, Hamburg, Germany, February 2003.Google Scholar
- Provos N. and Holz T. 2007, Virtual Honeypots: From Botnets Tracking to Instrusion Detection, Addision Wesley Professional Google ScholarDigital Library
Index Terms
- Honeypot in network security: a survey
Recommendations
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
RIIT '16: Proceedings of the 5th Annual Conference on Research in Information TechnologyA honeypot is a deception tool for enticing attackers to make efforts to compromise the electronic information systems of an organization. A honeypot can serve as an advanced security surveillance tool for use in minimizing the risks of attacks on ...
Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention
AbstractIntrusion Detection Systems and Intrusion Prevention Systems are used to detect and prevent attacks/malware from entering the network/system. Honeypot is a type of Intrusion Detection System which is used to find the intruder, study the intruder ...
Improving network security and design using honeypots
CUBE '12: Proceedings of the CUBE International Information Technology ConferenceFirewall technology has been widely used for to improve network security. However, it can detect several- types of attacks, it has not been able to detect malicious traffic inside an organization. Due to this limitation of the firewall technology in ...
Comments