Emerging Trends in Honeypot Research: A Review of Applications and Techniques
Authors/Creators
- 1. Department of Computer Science and Informatics, Central University of Himachal Pradesh, India
Description
Honeypots are decoys in cybersecurity, where a system is set up to attract and monitor cyber intruders. These systems appear vulnerable but are isolated and monitored, emulating the entire real world, for example, databases or IOT devices. To gain insight into their tactics, attackers interact with these decoys. Security teams can fortify their defences by learning about these emerging threats. Honeypots are classified on the basis of interaction offered. A low-interaction honeypot will only record the most basic attacks. High-interaction honeypots, in contrast, allow attackers to be interacted with on a higher level, yielding more insight as to how they operate. By adopting this approach early, organizations can better understand how they might be targeted by potential attackers. Besides enabling the early detection of threats, they publish decoys that honeypots distract attackers away from actual systems. But they fail to catch all attacks, particularly those that do not engage the decoy. Honeypots must be kept current to remain effective against rapidly evolving threats.
Files
IJHCI-Paper-01-V3i6.pdf
Files
(265.6 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:79931740661810688da5afab4dac352b
|
265.6 kB | Preview Download |