Honeypots: Sweet OR Sour spot in Network Security?

Authors

  • Aman Sachan Computer Engineering Department, Bharati Vidyapeeth Deemed University, College of Engineering Pune-43, Maharashtra, India Author
  • Renuka Panchagavi Computer Engineering Department, Bharati Vidyapeeth Deemed University, College of Engineering Pune-43, Maharashtra, India Author

DOI:

https://doi.org/10.14741/

Abstract

In the past few years, there has been a dramatic escalation of cyber and network attacks. In the next generation of attacks, attackers are more likely to use less malware and instead find valid credentials online. A lot of traditional defensive technologies like intrusion detection, firewalls and prevention systems, anti-malware scanners, fail to detect such breaches. Therefore, there is a need for sophisticated anomaly detection or a deception trap, designed to entice an attacker and when deployed correctly can serve as an early warning and security surveillance tool. The deception trap can be in the form of a server attached to the internet which acts as a decoy, luring in potential hackers and monitoring their activities. Such a system is called a honeypot. Honeypots are designed to mimic the actual systems that the intruder wants to break into but limiting the intruder from accessing the entire network. Despite of several advantages, Honeypots cannot be the ultimate security solution for networks. This paper discusses about the pros and cons of using honeypots as a network security solution for overcoming breaches of information security.

References

Downloads

Published

2016-06-30

Issue

Section

Articles

How to Cite

Honeypots: Sweet OR Sour spot in Network Security?. (2016). International Journal of Current Engineering and Technology, 6(3), 904-907. https://doi.org/10.14741/