Open Access   Article Go Back

Honeypot in Information System Security

N. Shoba1 , V. Sathya2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 33-35, May-2019

Online published on May 22, 2019

Copyright © N. Shoba, V. Sathya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Shoba, V. Sathya, “Honeypot in Information System Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.33-35, 2019.

MLA Style Citation: N. Shoba, V. Sathya "Honeypot in Information System Security." International Journal of Computer Sciences and Engineering 07.17 (2019): 33-35.

APA Style Citation: N. Shoba, V. Sathya, (2019). Honeypot in Information System Security. International Journal of Computer Sciences and Engineering, 07(17), 33-35.

BibTex Style Citation:
@article{Shoba_2019,
author = {N. Shoba, V. Sathya},
title = {Honeypot in Information System Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {33-35},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1305},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1305
TI - Honeypot in Information System Security
T2 - International Journal of Computer Sciences and Engineering
AU - N. Shoba, V. Sathya
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 33-35
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

This days security in information system is very challenging , so security for network security plays a vital role in all fields. A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. The function of a honeypot is to represent itself on the internet as a potential target for attackers -- usually a server or other high-value target -- and to gather information and notify defenders of any attempts to access the honeypot by unauthorized users. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.

Key-Words / Index Term

Honeypot, hacking, security, forensic analysis of honeypots, network

References

[1]. Spitzner L.2001.The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues [Online] (Updated 23 October 2001) Available at : http://www.symantec.com/connect/articles/value-honeypots-part-two-honeypot-solutionsand-legal-issues [Accessed 13 March 2010].
[2]. https://en.wikipedia.org/wiki/Honeypot_(computing)
[3]. Sutton Jr.,R.E DTEC 6873 Section 01:How to build and use a honeypot.
[4]. https://searchsecurity.techtarget.com/definition/honey-pot
[5]. Lakhani A.D., A dissertation on deception techniques using honeypots.Information Security Group Royal Holloway, University of London,UK.
[6]. Shuja F.A.,2005. Pakistan Honeynet Project Virtual Honeynet: Deploying Honeywall using Vmware [Online](Updated November 2005) Available at: http://www.honeynet.pk/Honeywall/roo/index.htm [Accessed 7 May 2010].
[7]. https://www.symantec.com/connect/articles/problems-and-challenges-honeypots
[8]. http://www.informit.com/articles/article.aspx?p=30489&seqNum=2