Web Based Honeypots Network

نویسنده

  • Srivathsa S Rao
چکیده

Honeypots are a modern approach to network security. A honeypot is used in the area of internet security and cryptography. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used implementations. It can be deployed to attract and divert an attacker from their real targets. Honeypots have the big advantage that they do not generate false alerts as each observed traffic is doubtful, because no productive components are running on the system. This fact enables the system to log every byte that flows through the network through and from the honeypot, and to relate this data with other sources to draw a picture of an attack and the attacker. This paper would first give a brief introduction to honeypotsthe types and its uses. We will then look at the other components of honeypots and the way to put them together. Finally we shall conclude by looking at what the future holds for honeypots.’

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

Honeypot based Secure Network System

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection b...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

A Generic Toolkit for Converting Web Applications Into High-Interaction Honeypots

In this paper, we present the design and implementation of a generic toolkit for turning arbitrary PHP web applications into high interaction honeypots in an automated fashion. We demonstrate the wide applicability of this approach by applying it to four popular existing web applications. Moreover, we show the effectiveness of our system by using it to analyze 70 actual attacks including 9 comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013