Skip to main content

Honeypot Framework, Limitation and Counter-Measure

  • Chapter
  • First Online:
Honeypot Frameworks and Their Applications: A New Framework

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks ((BRIEFSCSSN))

  • 1098 Accesses

Abstract

This chapter describes the conceptual framework of the honeypot. A detailed diagram reveals the workflow of a honeypot. Honeypot does have limitation and that is its common features which can be easily speculated by the attackers. The technique used will be discussed in detail. The distinct difference between the honeypot and a real system is if it gives away its identity. In order for the Research community to stay ahead of this cat and mouse game, we here in the chapter review many honeypot detecting methods proposed by recent researchers so as to improve some of the features. /the online available honeypot detection tool is referenced in this chapter as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.S. Sadamate, V. Nandedkar, in Advance Honeypot Mechanism-the Hybrid Solution for Enhancing Computer System Security with DoS, vol. 4 (2015)

    Google Scholar 

  2. M. Akiyama, Y. Kawakoya, T. Hariu, Scalable and performance-efficient client honeypot on high interaction system, in 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT) (IEEE, 2012), pp. 40–50

    Google Scholar 

  3. T.-M. Koo, H.-C. Chang, Y.-T. Hsu, and H.-Y. Lin, Malicious website detection based on honeypot systems, in 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) (Atlantis Press, 2013)

    Google Scholar 

  4. P. Chen, L. Desmet, C. Huygens, A study on advanced persistent threats, in Communications and Multimedia Security (Springer, 2014), pp. 63–72

    Google Scholar 

  5. B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217

    Chapter  Google Scholar 

  6. S. M. Khattab, C. Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati, Roaming honeypots for mitigating service-level denial-of-service attacks, in 24th International Conference on Distributed Computing Systems, 2004. Proceedings (IEEE, 2004), pp. 328–337

    Google Scholar 

  7. J.P. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi, Heat-seeking honeypots: design and experience, in Proceedings of the 20th International Conference on World Wide Web (ACM, 2011), pp. 207–216

    Google Scholar 

  8. S. Mukkamala, K. Yendrapalli, R. Basnet, M. Shankarapani, A. Sung, Detection of virtual environments and low interaction honeypots, in Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC (IEEE, 2007), pp. 92–98

    Google Scholar 

  9. T. Holz, F. Raynal, Detecting honeypots and other suspicious environments, in Proceedings from the Sixth Annual IEEE SMC on Information Assurance Workshop, 2005. IAW’05 (IEEE, 2005), pp. 29–36

    Google Scholar 

  10. X. Fu, W. Yu, D. Cheng, X. Tan, K. Streff, S. Graham, On recognizing virtual honeypots and countermeasures, in 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (IEEE, 2006), pp. 211–218

    Google Scholar 

  11. C.C. Zou, R. Cunningham, Honeypot-aware advanced botnet construction and maintenance, in International Conference on Dependable Systems and Networks, 2006. DSN 2006 (IEEE, 2006), pp. 199–208

    Google Scholar 

  12. P. Wang, L. Wu, R. Cunningham, C.C. Zou, Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4(1), 30–51 (2010)

    Google Scholar 

  13. O. Hayatle, A. Youssef, H. Otrok, Dempster-shafer evidence combining for (anti)-honeypot technologies. Inf. Secur. J. Glob. Perspect. 21(6), 306–316 (2012)

    Article  Google Scholar 

  14. K. Graves, in CEH Certified Ethical Hacker Study Guide (Wiley, 2010)

    Google Scholar 

  15. M. Gregg, in Certified Ethical Hacker (CEH) Cert Guide (Pearson IT Certification, 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chee Keong Ng .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ng, C.K., Pan, L., Xiang, Y. (2018). Honeypot Framework, Limitation and Counter-Measure. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7739-5_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7738-8

  • Online ISBN: 978-981-10-7739-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics