Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.1.21

Honeypots Tools Study and Analysis  

Al-Jameel, Sultan (Department of Computer Science and Engineering, University of Hail)
Alanazi, Adwan Alownie (Department of Computer Science and Engineering, University of Hail)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.1, 2021 , pp. 162-173 More about this Journal
Abstract
The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.
Keywords
Honeypot; Security; low; medium; high; production; research; PentBox; honeydrive; attackers;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Fruhlinger, J. (2019, April 01). What is a honeypot? A trap for catching hackers in the act. Retrieved November 7, 2020, from https://www.csoonline.com/article/3384702/what-is-a-honeypot-a-trap-for-catching-hackers-in-the-act.htm
2 Honeypot (computing). (2020, November 13). Retrieved November 11, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
3 "A Honeypot For Assholes": Inside Twitter's 10-Year Failure To Stop Harassment. (n.d.). Retrieved November 13, 2020, from https://ontdpolitical.livejournal.com/11567255.html
4 Livshitz, I. (2020, January 05). Low, Medium and High Interaction Honeypot Security. Retrieved November 10, 2020, from https://www.guardicore.com/2019/1/high-interaction-honeypot-versus-low-interaction-honeypot/
5 Benefits of Honeypots - There's More to Honeypots Than Wasting Hackers' Time. (2018, August 22). Retrieved November 11, 2020, from https://www.webtitan.com/blog/honeypots-how-far-can-you-go-in-wasting-a-hackers-time/
6 Skoudis, E. (2008, January 04). What security risks do enterprise honeypots pose? Retrieved October 13, 2020, from https://searchsecurity.techtarget.com/answer/What-security-risks-do-enterprise-honeypots-pose
7 NG, C. K., Pan, L., & Xiang, Y. (2018). Honeypot Frameworks and Their Applications: A New Framework. Singapore: Springer Singapore.
8 Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 6, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
9 Honeypots For Network Security Information Technology Essay - Free Essay Example by Essaylead. (2017, July 15). Retrieved November 11, 2020, from https://essaylead.com/honeypots-for-network-security-information-technology-essay-1428/
10 Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 8, 2020, from https://catchupdates.com/honeypots/
11 Honeypot (computing). (2020, November 13). Retrieved November 15, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
12 PentBox Tutorial (A Penetration Testing Tool). (n.d.). Retrieved November 17, 2020, from https://www.hackingarticles.in/pentbox-tutorial-a-penetration-testing-tool/
13 -, R., By, -, Ranjithhttp://kalilinuxtutorials.comA nonchalant person with a dexterity for writing and working as a Engineer., Ranjith, A nonchalant
14 Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 11, 2020, from https://catchupdates.com/honeypots/
15 Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 20, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
16 Toolsmith: HoneyDrive - Honeypots in a Box. (2014, October 03). Retrieved November 18, 2020, from https://holisticinfosec.blogspot.com/2014/10/toolsmith-honeydrive-honeypots-in-box.html
17 Download HoneyDrive 3. (2014, July 29). Retrieved November 10, 2020, from https://linux.softpedia.com/get/System/Operating-Systems/Linux-Distributions/HoneyDrive-102674.shtml
18 Tripwire Guest AuthorsDec 29, 2. S. (2019, December 17). Honeypots: A Guide To Increasing Security. Retrieved November 20, 2020, from https://www.tripwire.com/state-of-security/security-data-protection/honeypots-guideincreasing-security/
19 How To Establish a Honeypot on Your Network - Step by Step. (2020, September 29). Retrieved November 13, 2020, from https://www.comparitech.com/net-admin/how-to-establish-a-honeypot-on-your-network/
20 person with a dexterity for writing and working as a Engineer., ... -, B. N. (2019, June 19). Kippo - SSH Honeypot To Log Brute Force Attacks. Retrieved November 19, 2020, from https://kalilinuxtutorials.com/kippo-honeypot-brute-force-attacks/