DOI QR코드

DOI QR Code

Honeypots Tools Study and Analysis

  • Received : 2021.01.05
  • Published : 2021.01.30

Abstract

The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.

Keywords

References

  1. Fruhlinger, J. (2019, April 01). What is a honeypot? A trap for catching hackers in the act. Retrieved November 7, 2020, from https://www.csoonline.com/article/3384702/what-is-a-honeypot-a-trap-for-catching-hackers-in-the-act.htm
  2. Honeypot (computing). (2020, November 13). Retrieved November 11, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
  3. Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 8, 2020, from https://catchupdates.com/honeypots/
  4. "A Honeypot For Assholes": Inside Twitter's 10-Year Failure To Stop Harassment. (n.d.). Retrieved November 13, 2020, from https://ontdpolitical.livejournal.com/11567255.html
  5. Livshitz, I. (2020, January 05). Low, Medium and High Interaction Honeypot Security. Retrieved November 10, 2020, from https://www.guardicore.com/2019/1/high-interaction-honeypot-versus-low-interaction-honeypot/
  6. Honeypots For Network Security Information Technology Essay - Free Essay Example by Essaylead. (2017, July 15). Retrieved November 11, 2020, from https://essaylead.com/honeypots-for-network-security-information-technology-essay-1428/
  7. Benefits of Honeypots - There's More to Honeypots Than Wasting Hackers' Time. (2018, August 22). Retrieved November 11, 2020, from https://www.webtitan.com/blog/honeypots-how-far-can-you-go-in-wasting-a-hackers-time/
  8. Skoudis, E. (2008, January 04). What security risks do enterprise honeypots pose? Retrieved October 13, 2020, from https://searchsecurity.techtarget.com/answer/What-security-risks-do-enterprise-honeypots-pose
  9. Honeypot (computing). (2020, November 13). Retrieved November 15, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
  10. How To Establish a Honeypot on Your Network - Step by Step. (2020, September 29). Retrieved November 13, 2020, from https://www.comparitech.com/net-admin/how-to-establish-a-honeypot-on-your-network/
  11. NG, C. K., Pan, L., & Xiang, Y. (2018). Honeypot Frameworks and Their Applications: A New Framework. Singapore: Springer Singapore.
  12. PentBox Tutorial (A Penetration Testing Tool). (n.d.). Retrieved November 17, 2020, from https://www.hackingarticles.in/pentbox-tutorial-a-penetration-testing-tool/
  13. Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 6, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
  14. Toolsmith: HoneyDrive - Honeypots in a Box. (2014, October 03). Retrieved November 18, 2020, from https://holisticinfosec.blogspot.com/2014/10/toolsmith-honeydrive-honeypots-in-box.html
  15. -, R., By, -, Ranjithhttp://kalilinuxtutorials.comA nonchalant person with a dexterity for writing and working as a Engineer., Ranjith, A nonchalant
  16. person with a dexterity for writing and working as a Engineer., ... -, B. N. (2019, June 19). Kippo - SSH Honeypot To Log Brute Force Attacks. Retrieved November 19, 2020, from https://kalilinuxtutorials.com/kippo-honeypot-brute-force-attacks/
  17. Download HoneyDrive 3. (2014, July 29). Retrieved November 10, 2020, from https://linux.softpedia.com/get/System/Operating-Systems/Linux-Distributions/HoneyDrive-102674.shtml
  18. Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 11, 2020, from https://catchupdates.com/honeypots/
  19. Tripwire Guest AuthorsDec 29, 2. S. (2019, December 17). Honeypots: A Guide To Increasing Security. Retrieved November 20, 2020, from https://www.tripwire.com/state-of-security/security-data-protection/honeypots-guideincreasing-security/
  20. Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 20, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot