Honeypot: Concepts, Types and Working
Honeypot: Concepts, Types and Working
Honeypot: Concepts, Types and Working
Abstract - In couple of decades number of attacks on IT organization has increased. Among them small and medium sized
organization’s risk is higher because of lower security architecture in their system. Attackers use SQL injection and XSS
type of attacks to exploit the vulnerability of the system or the organization. A mechanism which is created to learn about
the attackers’ method of attack and pattern and also used to get useful information about the intrusive activity is
Honeypot. Honeypots can be classified according to the level of interaction as low-interaction, medium-interaction, high-
interaction and the purposed for which it is used as research honeypot and production honeypot. Detailed study about the
types of honeypot is included in this paper. Various honeypot results are enlisted in this paper to show that how honeypot
works in real-time environment and how it responds when any unwanted activity occurs in the network.
V. CONCLUSION
Honeypot is a useful tool for luring and trapping attackers, capturing information. Security is the essential element of any
organization web sites, but though the security provided by the honeypots based on hardware setups are very expensive for small
and medium scaled organization; a software based honeypot may be proven as a very effective security solution for these
organizations. Among all these types of Honeypot low-interaction Honeypot is the mostly used Honeypot, because it is easy to
implement and manage. But the most secure and efficient Honeypot type is High-interaction Honeypot. These honeypots provide
security as well as generates a log about all entries in the system which is very helpful to find the intrusive activity in the system.
But the honeypot must need to upgrade to new methods and attacks at some interval of time to provide security against new type
to attacks. It can’t be said as a solution but it is a good supplement for the security system.
VI. FUTURE SCOPE
From the above conclusion it is clear that low-interaction Honeypot is most popular and widely used because of its ease of
deployment but there are some disadvantage like it may not detect all the attacks and gathers limited information only. Whereas
high-interaction honeypot is complex to manage and deploy but gathers more precise details. Future challenge will be combining
both types of Honeypot and design a hybrid kind of Honeypot which will have advantages of both the approaches. This can have
moderate complexity and it should obtain more precise information of the intruder.
VII. REFERENCES
[1] Supeno Djanali, FX Arunanto, Baskoro Adi Pratomo, Abdurrazak Baihaq Hudan Studiawan, Ary Mazharuddin Shiddiqi,
“Aggressive Web Application Honeypot for Exposing Attacker's Identity” , 2014 1st International Conference on Information
Technology, Computer and Electrical Engineering (ICITACEE).
[2] Iyad Kuwatly, Malek Sraj, Zaid AI Masri, and Hassan Artail, “A Dynamic Honeypot Design for Intrusion Detection”,
©2004 IEEE.
[3] Song LI, Qian Zou, Wei Huang, “A New Type of Intrusion Prevention System”, ©2014 IEEE.
[4] Jian Bao,Chang-peng Ji and Mo Gao,“Research on network security of defense based on Honeypot”, 2010 international
Conference on Computer Application and System Modeling (ICCASM 2010).
[5] Mr. Kartik Chawda ,Mr. Ankit D. Patel ,“Dynamic & Hybrid Honeypot Model for Scalable Network Monitoring”, ©2014
IEEE.
[6] Robert McGrew, Rayford B. Vaughn, JR, PhD,” Experiences With Honeypot Systems: Development, Deployment, and
Analysis”, Proceedings of the 39th Hawaii International Conference on System Sciences – 2006.
[7] Iyatiti Mokube , Michele Adams, “Honeypots: Concepts, Approaches, and Challenges”.
[8] Feng Zhang, Shijie Zhou. Zhiguang Qin, Jinde Liu, “Honeypot: a Supplemented Active Defense System for Network
Security”, ©2003 IEEE
[9] https://www.owasp.org/index.php/Top_10_2013-Top_10
[10] Yun Yang, Jia Mi,“ Design and Implementation of Distributed Intrusion Detection System based on Honeypot”, ©2010
IEEE