Abstract
According to Lance Spitzner, any information collected by honeypot will be deemed as attack and unauthorized intrusion. Honeypot can be considered in two levels of Taxonomy. The basic level defines the logical order for planning to implement a honeypot. It also explains each category of the honeypot. The advanced taxonomy covers the deeper meaning of honeypot and describes some of the specialized honeypot framework. In this chapter, a roadmap is provided so as to allow the reader to easily grasp the number of homepot frameworks discussed in the Chap. 3. Honeypot developer and researcher faces several challenges such as the type of honeypot to be implemented, types of IDS used and level of difficulty for the hacker. Impropriate decision made may result collecting wrong information or even expose itself.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
L. Spitzner, Honeypots: catching the insider threat, in 19th Annual on Computer Security Applications Conference, 2003. Proceedings (IEEE, 2003), pp. 170–179
G. Feng, C. Zhang, Q. Zhang, A design of linkage security defense system based on honeypot, in Trustworthy Computing and Services (Springer, 2014), pp. 70–77
R. Hes, P. Komisarczuk, R. Steenson, C. Seifert, The capture-hpc client architecture, Technical Report (Victoria University of Wellington, 2009)
B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217
B.K. Mirsha, U. Kumar, G. Sahoo, in Double-Sticky-Honeynet for Defending Viruses in Computer Network, vol. 7 (2012), pp. 131–134
L. Spitzner, Dynamic honeypots (2003)
X. Jiang, X. Wang, D. Xu, Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction, in Proceedings of the 14th ACM conference on Computer and communications security (ACM, 2007), pp. 128–138
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, H. Owen, Honeystat: local worm detection using honeypots, in Recent Advances in Intrusion Detection (Springer, 2004), pp. 39–58
J. Song, H. Takakura, Y. Okabe, Cooperation of intelligent honeypots to detect unknown malicious codes, in WOMBAT Workshop on Information Security Threats Data Collection and Sharing, 2008. WISTDCS’08 (IEEE, 2008), pp. 31–39
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Ng, C.K., Pan, L., Xiang, Y. (2018). Design Honeypots. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-7739-5_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7738-8
Online ISBN: 978-981-10-7739-5
eBook Packages: Computer ScienceComputer Science (R0)