Journal Press India®

Distributed Honeypots System

Vol 1 , Issue 2 , April - June 2013 | Pages: 5-11 | Research Paper  

https://doi.org/10.51976/ijari.121302

| | |


Author Details ( * ) denotes Corresponding author

1. * Sachin Chaudhary, Department of Computer Science & Engineering, TMU, Moradabad, Uttar Pradesh, India (sachin.chaudhary126@gmail.com)
2. Kanchan Chaudhary, Department of Computer Science & Engineering, TMU, Moradabad, Uttar Pradesh, India

Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, Honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them.

Keywords

Honeypots; Types of Honeypots; Legal Issues

  1. Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st Ed Boston, MA, USA: Addison Wesley.
  2. Mokube, I. & Adams M. 2007 Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, WinstonSalem, North Carolina, USA, pp.321325
  3. Aaron Lanoy and Gordon W. Romney, Senior Member, IEEE [2006] A Virtual Honey Net as a Teaching Resource
  4. F.A. Shuja. (2005, November) Virtual Honeynet: Deploying Honeywall using VMware, Pakistan Honeynet Project [Online], Available: http://www.honeynet.org.pk/honeywall/roo/
  5. (2005, August). Know Your Enemy: Honeywall CDROM Roo3rd Generation Technology, Honeynet Project & Research Alliance, and [Online] Available: http://www.honeynet.org, Last Modified: 2005
  6. G. Romney, et al., "A Teaching Prototype for Educating IT Security Engineers in Emerging Environments," Presented at the IEEE ITHET 2004 Conference in Istanbul, Turkey, 2004.
  7. Cliaord Stoll. Stalking the Wily Hacker Communications of the ACM Pp 484497, 1988
  8. Ram Kumar Singh & Prof. T. Ramanujam. Intrusion DetectionSystem Using Advanced Honeypots, 2009
  9. Kabay, M.E. Honeypots, Part 2: Do honeypots constitute entrapment? Network World, 2003
  10. Karthik, S., Samudrala, B. and Yang, A.T. Design of Network Security Projects Using Honeypots Journal of Computing Sciences in Colleges, 20 (4)
  11. Martin, W.W. Honeypots and Honeynets – Security through Deception http://www.sans.org/reading_room/whitepapers/attackin g/41.php, SANS Institute, 2001, As Part of the Information Security Reading Room
  12. Provos, N. Honeypot Background. http://www.honeyd.org/background.php.
  13. Spitzner, L. The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy
  14. Spitzner, L. Honeypots: Tracking Hackers. Addison- Wesley Pearson Education, Boston, MA, 2002
  15. Spitzner, L. Honeytokens: The Other Honeypot. http://www.securityfocus.com/infoc us /1713, Security Focus, 2003
Abstract Views: 1
PDF Views: 170

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.