Honeypot in Information System Security
Keywords:
Honeypot, hacking, security,, forensic analysis of honeypots, networkAbstract
This days security in information system is very challenging , so security for network security plays a vital role in all fields. A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. The function of a honeypot is to represent itself on the internet as a potential target for attackers -- usually a server or other high-value target -- and to gather information and notify defenders of any attempts to access the honeypot by unauthorized users. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.
References
[1] Spitzner L.2001.The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues [Online] (Updated 23 October 2001) Available at : http://www.symantec.com/connect/articles/value-honeypots-part-two-honeypot-solutionsand-legal-issues [Accessed 13 March 2010]
[2] https://en.wikipedia.org/wiki/Honeypot_(computing)
[3] Sutton Jr.,R.E DTEC 6873 Section 01:How to build and use a honeypot.
[4] https://searchsecurity.techtarget.com/definition/honey-pot
[5] Lakhani A.D., A dissertation on deception techniques using honeypots.Information Security Group Royal Holloway, University of London,UK.
[6] Shuja F.A.,2005. Pakistan Honeynet Project Virtual Honeynet: Deploying Honeywall using Vmware [Online](Updated November 2005) Available at: http://www.honeynet.pk/Honeywall/roo/index.htm [Accessed 7 May 2010]
[7] https://www.symantec.com/connect/articles/problems-and-challenges-honeypots
[8] http://www.informit.com/articles/article.aspx?p=30489&seqNum=2
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
