Abstract
This chapter describes the conceptual framework of the honeypot. A detailed diagram reveals the workflow of a honeypot. Honeypot does have limitation and that is its common features which can be easily speculated by the attackers. The technique used will be discussed in detail. The distinct difference between the honeypot and a real system is if it gives away its identity. In order for the Research community to stay ahead of this cat and mouse game, we here in the chapter review many honeypot detecting methods proposed by recent researchers so as to improve some of the features. /the online available honeypot detection tool is referenced in this chapter as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S.S. Sadamate, V. Nandedkar, in Advance Honeypot Mechanism-the Hybrid Solution for Enhancing Computer System Security with DoS, vol. 4 (2015)
M. Akiyama, Y. Kawakoya, T. Hariu, Scalable and performance-efficient client honeypot on high interaction system, in 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT) (IEEE, 2012), pp. 40–50
T.-M. Koo, H.-C. Chang, Y.-T. Hsu, and H.-Y. Lin, Malicious website detection based on honeypot systems, in 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) (Atlantis Press, 2013)
P. Chen, L. Desmet, C. Huygens, A study on advanced persistent threats, in Communications and Multimedia Security (Springer, 2014), pp. 63–72
B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217
S. M. Khattab, C. Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati, Roaming honeypots for mitigating service-level denial-of-service attacks, in 24th International Conference on Distributed Computing Systems, 2004. Proceedings (IEEE, 2004), pp. 328–337
J.P. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi, Heat-seeking honeypots: design and experience, in Proceedings of the 20th International Conference on World Wide Web (ACM, 2011), pp. 207–216
S. Mukkamala, K. Yendrapalli, R. Basnet, M. Shankarapani, A. Sung, Detection of virtual environments and low interaction honeypots, in Information Assurance and Security Workshop, 2007. IAW’07. IEEE SMC (IEEE, 2007), pp. 92–98
T. Holz, F. Raynal, Detecting honeypots and other suspicious environments, in Proceedings from the Sixth Annual IEEE SMC on Information Assurance Workshop, 2005. IAW’05 (IEEE, 2005), pp. 29–36
X. Fu, W. Yu, D. Cheng, X. Tan, K. Streff, S. Graham, On recognizing virtual honeypots and countermeasures, in 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (IEEE, 2006), pp. 211–218
C.C. Zou, R. Cunningham, Honeypot-aware advanced botnet construction and maintenance, in International Conference on Dependable Systems and Networks, 2006. DSN 2006 (IEEE, 2006), pp. 199–208
P. Wang, L. Wu, R. Cunningham, C.C. Zou, Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4(1), 30–51 (2010)
O. Hayatle, A. Youssef, H. Otrok, Dempster-shafer evidence combining for (anti)-honeypot technologies. Inf. Secur. J. Glob. Perspect. 21(6), 306–316 (2012)
K. Graves, in CEH Certified Ethical Hacker Study Guide (Wiley, 2010)
M. Gregg, in Certified Ethical Hacker (CEH) Cert Guide (Pearson IT Certification, 2013)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Ng, C.K., Pan, L., Xiang, Y. (2018). Honeypot Framework, Limitation and Counter-Measure. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-7739-5_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7738-8
Online ISBN: 978-981-10-7739-5
eBook Packages: Computer ScienceComputer Science (R0)