Skip to main content

Design Honeypots

  • Chapter
  • First Online:
  • 1086 Accesses

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks ((BRIEFSCSSN))

Abstract

According to Lance Spitzner, any information collected by honeypot will be deemed as attack and unauthorized intrusion. Honeypot can be considered in two levels of Taxonomy. The basic level defines the logical order for planning to implement a honeypot. It also explains each category of the honeypot. The advanced taxonomy covers the deeper meaning of honeypot and describes some of the specialized honeypot framework. In this chapter, a roadmap is provided so as to allow the reader to easily grasp the number of homepot frameworks discussed in the Chap. 3. Honeypot developer and researcher faces several challenges such as the type of honeypot to be implemented, types of IDS used and level of difficulty for the hacker. Impropriate decision made may result collecting wrong information or even expose itself.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. L. Spitzner, Honeypots: catching the insider threat, in 19th Annual on Computer Security Applications Conference, 2003. Proceedings (IEEE, 2003), pp. 170–179

    Google Scholar 

  2. G. Feng, C. Zhang, Q. Zhang, A design of linkage security defense system based on honeypot, in Trustworthy Computing and Services (Springer, 2014), pp. 70–77

    Google Scholar 

  3. R. Hes, P. Komisarczuk, R. Steenson, C. Seifert, The capture-hpc client architecture, Technical Report (Victoria University of Wellington, 2009)

    Google Scholar 

  4. B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217

    Google Scholar 

  5. B.K. Mirsha, U. Kumar, G. Sahoo, in Double-Sticky-Honeynet for Defending Viruses in Computer Network, vol. 7 (2012), pp. 131–134

    Google Scholar 

  6. L. Spitzner, Dynamic honeypots (2003)

    Google Scholar 

  7. X. Jiang, X. Wang, D. Xu, Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction, in Proceedings of the 14th ACM conference on Computer and communications security (ACM, 2007), pp. 128–138

    Google Scholar 

  8. D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, H. Owen, Honeystat: local worm detection using honeypots, in Recent Advances in Intrusion Detection (Springer, 2004), pp. 39–58

    Google Scholar 

  9. J. Song, H. Takakura, Y. Okabe, Cooperation of intelligent honeypots to detect unknown malicious codes, in WOMBAT Workshop on Information Security Threats Data Collection and Sharing, 2008. WISTDCS’08 (IEEE, 2008), pp. 31–39

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chee Keong Ng .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ng, C.K., Pan, L., Xiang, Y. (2018). Design Honeypots. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7739-5_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7738-8

  • Online ISBN: 978-981-10-7739-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics