Honeypot in Information System Security

Authors

  • N Shoba Govt. Arts College for Women- Krishnagiri
  • V Sathya MGR Arts and Science College- Hosur

Keywords:

Honeypot, hacking, security,, forensic analysis of honeypots, network

Abstract

This days security in information system is very challenging , so security for network security plays a vital role in all fields. A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. The function of a honeypot is to represent itself on the internet as a potential target for attackers -- usually a server or other high-value target -- and to gather information and notify defenders of any attempts to access the honeypot by unauthorized users. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.

References

[1] Spitzner L.2001.The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues [Online] (Updated 23 October 2001) Available at : http://www.symantec.com/connect/articles/value-honeypots-part-two-honeypot-solutionsand-legal-issues [Accessed 13 March 2010]

[2] https://en.wikipedia.org/wiki/Honeypot_(computing)

[3] Sutton Jr.,R.E DTEC 6873 Section 01:How to build and use a honeypot.

[4] https://searchsecurity.techtarget.com/definition/honey-pot

[5] Lakhani A.D., A dissertation on deception techniques using honeypots.Information Security Group Royal Holloway, University of London,UK.

[6] Shuja F.A.,2005. Pakistan Honeynet Project Virtual Honeynet: Deploying Honeywall using Vmware [Online](Updated November 2005) Available at: http://www.honeynet.pk/Honeywall/roo/index.htm [Accessed 7 May 2010]

[7] https://www.symantec.com/connect/articles/problems-and-challenges-honeypots

[8] http://www.informit.com/articles/article.aspx?p=30489&seqNum=2

Downloads

Published

2025-11-25

How to Cite

[1]
N. Shoba and V. Sathya, “Honeypot in Information System Security”, Int. J. Comp. Sci. Eng., vol. 7, no. 17, pp. 33–35, Nov. 2025.