Advertisement

Honeypot Deployment Experience at IIT Kanpur

  • Rohit Sehgal
  • Nishit Majithia
  • Shubham Singh
  • Sanjay SharmaEmail author
  • Subhasis Mukhopadhyay
  • Anand Handa
  • Sandeep Kumar Shukla
Chapter
  • 16 Downloads
Part of the IITK Directions book series (IITKD, volume 4)

Abstract

Honeypot is a entrapment mechanism that provides attackers with all necessary resources needed for a successful attack. Unlike Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), which tries to stop malicious activity after detection, honeypot allows attacker to perform the attack and allows a cybersecurity researcher to get an thorough understanding of the attack patterns. Honeypot also helps in capturing the attack signatures, scripts and the payloads from the system. This chapter provides an idea about honeypots and different types of honeypots. We also describe the analysis of the attacks on honeypots deployed at IIT Kanpur.

Keywords

IoT honeypot HoneySMB HoneyFTP HoneyFARM MQTT 

References

  1. 1.
    Team H (2018) Internet stats and facts for 2019. https://hostingfacts.com/internet-facts-stats/. Accessed 30 May 2019
  2. 2.
    Technologies P (2017) Web application attack statistics. https://www.ptsecurity.com/ww-en/analytics/web-application-attack-statistics-q1-2017/. Accessed 29 May 2019
  3. 3.
    Raynal F, Berthier Y, Biondi P, Kaminsky D (2004) Honeypot forensics part 1: analyzing the network. IEEE Secur Priv 2(4):72–78CrossRefGoogle Scholar
  4. 4.
    Spitzner L (2003) Honeypots: tracking hackers, vol 1. Addison-Wesley, ReadingGoogle Scholar
  5. 5.
    Yeldi S, Gupta S, Ganacharya T, Doshi S, Bahirat D, Ingle R, Roychowdhary A (2003) Enhancing network intrusion detection system with honeypot. In: TENCON 2003 conference on convergent technologies for Asia-Pacific region, vol 4. IEEE, pp 1521–1526Google Scholar
  6. 6.
    Döring C (2005) Conceptual framework for a honeypot solution. Interactive systems and technologies: the problems of human, p 179Google Scholar
  7. 7.
    OpenCanary honeypot (2017). https://opencanary.readthedocs.io/en/latest/. Accessed Jun 2019
  8. 8.
    Banon S (2010) ELK (Elasticsearch, Logstash, and Kibana). https://www.elastic.co/elk-stack. Accessed Jun 2019
  9. 9.
    Oosterhof M (2015) Cowrie medium interaction honeypot. https://cowrie.readthedocs.io/en/latest/index.html. Accessed May 2019
  10. 10.
    Dowling S, Schukat M, Melvin H (2017) A zigbee honeypot to assess IoT cyberattack behaviour. In: 2017 28th Irish signals and systems conference (ISSC). IEEE, pp 1–6Google Scholar
  11. 11.
    Wang M, Santillan J, Kuipers F (2018) Thingpot: an interactive internet-of-things honeypot. arXiv:1807.04114
  12. 12.
    Hunkeler U, Truong HL, Stanford-Clark, A (2008) MQTT-S-a publish/subscribe protocol for wireless sensor networks. In: 2008 3rd international conference on communication systems software and middleware and workshops (COMSWARE’08). IEEE, pp 791–798Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Rohit Sehgal
    • 1
  • Nishit Majithia
    • 1
  • Shubham Singh
    • 1
  • Sanjay Sharma
    • 1
    Email author
  • Subhasis Mukhopadhyay
    • 1
  • Anand Handa
    • 1
  • Sandeep Kumar Shukla
    • 1
  1. 1.Indian Institute of Technology KanpurKanpurIndia

Personalised recommendations