Abstract :
Honeypotting has evolved into a crucial tool in information security analysis, despite the fact that the concept of enticing enemies in order to watch their activities is not new. Honeynets, honeytokens, and adaptive honeypots are examples of recent advancements in network intrusion detection. This article will look at modern applications, as well as the technical issues that go into developing honeypot solutions for dynamically blocking emerging attack vectors and exploitation of sophisticated persistent threats.
Keywords :
Honeypots, Information SecurityReferences :
1. Cole, E., & Northcutt, S. (2008). Honeypots: a security manager’s guide to honeypots. SANS Institute.
2. Chismon, D. (2016). Hunting with honeypots. MWR Infosecurity.
3. Even, L. R. (2000). Intrusion detection FAQ: what is a honeypot? SANS Institute.
4. Innes, S. & Valli, C. (2006). Honeypots: how do you know you’re in one? Edith Cowan University.
5. Nithin Chandra, S., & Madhuri, T. (2012). Cloud security using honeypot systems. International Journal of Scientific & Engineering Research [Vol 3, No 3].
6. Spitzner, L (2003). Honeytokens: the other honeypot. Symantic.
7. Spitzner, L (1999). To build a honeypot. SCN Research.
8. Wagener, G. & Dulaunoy, A. (2011). Adaptive and self-configuring honeypots. IEEE.
9. Winder, D. (2014). How to use the cloud as a honeypot. CloudPro.
10. (2015). Detecting mimikatz use on your network. SANS ISC InfoSec Forums.