Honeypots: Virtual Network Intrusion Monitoring System

Authors

  • Manmohan Dagar Department of Computer Networking, YMCA University of Science and Technology, Faridabad, India
  • Rashmi Popli Department of Computer Networking &Information Technology, YMCA University of Science and Technology, Faridabad, India

Keywords:

Honeypot, Intrusion Detection System (IDS), Honeyd, Load Balancer, Honeycomb and Honeywall

Abstract

In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider and the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your information. This paper discusses how honeypot technologies can be used to detect, identify, and gather information on these specific threats.

 

References

Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley.

Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23-24, 2007, Winston-Salem, North Carolina, USA.

Aaron Lanoy and Gordon W. Romney, Senior Member. A Virtual Honey Net as a Teaching Resource," 2006 7th International Conference on Information Technology Based Higher Education and Training, Ultimo, NSW, pp. 666-669, 2006.

A Survey of Botnet Technology and Defenses. Available from: M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, "A Survey of Botnet Technology and Defenses," 2009 Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, pp. 299-304, 2009.

Abigail Paradise, Asaf Shabtai, Rami Puzis - "Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks," in IEEE Transactions on Computational Social Systems, vol. 4, no. 3, pp. 65-79, Sept. 2017.

S. Kemp. Digital in 2017: Global Overview, accessed on Jan. 24, 2017.

The Honeynet Project. (2014). “Outsmarting the smart meter”

Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.

J. Markert and M. Massoth, “Honeypot framework for wireless sensor networks,” in Proc. Int. Conf. Adv. Mob. Comput. Mult., Dec. 2013.

V. Pothamsetty and M. Franz, SCADA HoneyNet Project: Building Honeypots for Industrial Networks, tech. report, Cisco Systems, 2005

N. Provos, Developments of the Honeyd Virtual Honeypot, user forum, 2008

Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.

The Honeynet Project, Honeywall, 2016.

V. Paxson, .Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23-24, pp. 2435.2463, 1998.

M. Roesch, .Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on Systems Administration, 1999

R. Piggin, I. Buffey - "Active defence using an operational technology honeypot," 11th International Conference on System Safety and Cyber-Security (SSCS 2016), London, pp. 1-6, 2016.

Nikita M. Danchenko, Anton O. Prokofiev, Dmitry S. Silnov "Detecting suspicious activity on remote desktop protocols using Honeypot system," 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, pp. 127-128, 2017.

Pradeep Chouksey, "Study of Routing in Ad hoc network", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.55-57, 2017.

M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017

Downloads

Published

2018-04-30

How to Cite

[1]
M. Dagar and R. Popli, “Honeypots: Virtual Network Intrusion Monitoring System”, Int. J. Sci. Res. Net. Sec. Comm., vol. 6, no. 2, pp. 45–49, Apr. 2018.

Issue

Section

Review Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.