SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1200
Review on Honeypot Security
Satish Mahendra Kevat
Student, Department Of MCA, Vivekanand Education Society's Institute of Technology, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A honeypot is a PC framework that is set up togo
about as an imitation to baitcyberattackers, andtorecognize,
divert or think about endeavorstoincreaseunapprovedaccess
to data frameworks. it comprises of a PC, applications, and
information that recreate the behavior of a genuine system
that appears to be part of a network but is actually isolated
and closely observed. All interchanges with a honeypot are
viewed as hostile, as there's no explanation behind genuine
clients to get to a honeypot. On the off chance that a honeypot
is effective, the attacker will have no clue that she/he is being
deceived and observed.
Key Words: Honeypot,IDS,Attack Finder,Deflector,Firewall
1. INTRODUCTION
There has been a significant increase in the number of users
that are connecting to the internet day by day, with this
increase in user’s , the malicious intrusions and risk is also
increasing.Various systems are being implemented to detect
this intrusions and honeypot is one such intrusion detecting
system.
In computer technology, a honeypot is atrapsettorecognize,
redirect or in some way balance endeavors at unapproved
utilization of data frameworks. Its principle point does not
include a snare for black hat community but rather the
concentration lies in quiet accumulation of data as possible
about their pattern, programs utilized andreasonforassault.
Honeypot creates a log which refers to an intrusive activity
by detecting intruders. It also helps to reduce the risks of
security breaches.
Fig 1: Simple Honeypot
1.1 Where to place honeypot
Honeypots can be placed in any of the three areas in
organization; they can be placed externally on theinternetor
internally on the intranet.
Fig 2: Placement of Honeypot
1.1.1 In front of firewall
When using in front of the firewall (i.e internet), it does not
affect internal network, which reduces the risk of
compromising the internal system. Inthiskindofplacement,
when attacker attacks, the firewall does not create the log
and thus, there will be difficulty in locating internal
attackers.
1.1.2 Behind the firewall
When using behind the firewall, it keeps the of internal
attackers activities and also helps in identifying
misconfigured firewall. But being inside the network, some
security risks arises, if the internal network is not secured
with some additional security mechanism.
1.1.3 DMZ
By placing honeypot insidea DMZ(Demilitarizedzone)itself
create a great level of securitywithflexible environment. But
to use in DMZ, it may require some expert knowledge
because it involves some complex hardwares.
Thus, honeypot can be placed behind the firewall only if we
want to detect the internal attacks or else, it can be placed
outside the firewall.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1201
1.2 Building a VM based honeypot
To assemble a honeypot, An arrangementofvirtualmachines
(VMs) are made. They are then setup on a private system
with the host OS. To encourage informationcontrol,astateful
firewall, for example, IPTables can be utilized to log
connections. This firewall would regularly be designed in
Layer 2 crossing over mode, rendering it straightforward to
the attacker. The last step is information catch, for which
tools such as Sebek and Term Log can be utilized. When
information has been caught, investigation on the
information can be performed utilizing tools such as Honey
Inspector, PrivMsg and Sleuth Kit.
This approach is found to be remarkable in its simplicity and
feel that a few significant issues need to be brought to light.
1. The choice of a private host-only network. Though this
may seem counter intuitive at first, there is a relatively
sound reasoning for doing so.
2. While bridging the VMs on to the physical network
would seem like a better approach because it transparently
forwards packets to the VMs and eliminates an additional
layer of routing, it requires an additional data control device
which will monitor thepackets being sent fromthe VMs.The
operation of data control cannot be performed by the host
OS when the VMs are in bridged mode, since all data from
the VMs bypass any firewalls or IDSs which exist at the
application layer on the host, as shown in the fig 2 below.
Fig 3: Structure of A VM Based Honeypot
3. The firewall on the host should be transparent to the
attacker. This requires considerable effort,sincefirewallsby
default work at Layer 3 or greater.
To render the firewall transparent to the attacker requires
recompilation of the kernel. This may not be conceivableon
every OS, for example, Windows.
At long last, once a honeypot is breached, a rebuilding
component must be implemented with the goal that it is in a
split second removed from the system and thoroughly
checked before putting it back on the system. This is as of
now a manual procedure and can only be partly automated.
2. POINTS TO CONSIDER WHILE IMPLEMENTING A
HONEYPOT
2.1 Intent of using:
There are 2 purpose of using honeypot: Early warning and
forensic analysis.
Early warning honeypots are easy and simple to setup and
are more efficient in catching hackers and malware than
other systems. This honeypothelps to detect and identifythe
attacker with merely a single connection with it.
Forensic analysis honeypot capture and isolate the malware
and attacker’s tools, and reports the user to create a plan in
several days while analysing the attackers captured data.
2.2 Interaction level:
Based on the interactionwiththeattackerhoneypotisnamed
as low, medium and high interaction.
Low interaction honeypot are intended to imitatevulnerable
services and identify attacker’s assault without uncovering
full operating system functionalities.
Medium interaction honeypot are further capable of
emulating full services or specific vulnerabilities and may
contain basic file structures.
High interaction honeypot mainly emulates the full system
and it’s capabilities, and are useful for forensic analysis
because it may trick the attacker to reveal their more tricks.
2.3 To be deployed on real system or emulation
software:
Real systems are best to use because the attacker is having
difficulty in differentiating between the genuine system and
honeypot. For real systems, oldcomputerscanbeused.Butif
we want a low- risk, and quick installation honeypot,
emulation software can be used.
2.4 Honeypot administrator:
Honeypot administrator is the person responsible for
maintaining the honeypot. This person should install, run,
update and maintain the honeypot. If honeypot is not
updated and maintained, then it become useless and a
jumping off spot for attacker’s.
2.5 Updating the data:
If we use high interaction honeypot, it requires continuous
updation of data into honeypot , to make it look real. Thiscan
be done in sometimemanually or canbeupdatedusingsome
software or copy programs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1202
3. Other Security techniques
3.1 Firewall
Firewall defines a single entry/exit point that keeps
unapproved clients out of the secured network, denies
possibly helpless services from entering or, then again
leaving the system and gives security from different sorts
of IP mocking and directing assaults.
Fig 4: Simple Firewall Deployment
Single gag point rearranges security administration since
security abilities are merged on a single system or set of
systems. The firewall itself is immune to entrance. This
implies that utilizationoftrustedsystem withsecure working
OS.
A firewall is a collaboration software and hardware which
separates an organizations internal network and other
networks. Firewalls cannotpreventtheattacksfrominternal
system (intranet).
3.2 Intrusion Detection system (IDS)
Fig 5 : Simple IDS Deployment
An intrusion detection system (IDS) checks network traffic
and searches for any suspicious or irregular activity and
alerts the system or system administrator. At times the IDS
may likewise react to irregular or malicious activity by
making a move, for example, blocking the client or source IP
address from getting to the system. IDS are simple to
implement as it does not affect existing systems.
Generally, there are 2 types of IDS:
3.2.1 Host IDS (HIDS)
HIDS system runs on the host machine or devices which
detect malicious activity on that host. The HIDS monitors
the messages/packets and report to the user of any
suspicious activity.
3.2.2 Network IDS (NIDS)
NIDS operate on the net- work between the devices. This
system monitors the data traffic between this devices in the
network for any irregularities or malicious activity. This
systems are responsible for monitoring and reporting of
entire network rather than a single host.
4. LEGAL ISSUES WITH HONEYPOT
Before using and deploying honeypot, we must understand
the legal issues involved with it. The following issues can
affect the owner of honeypot:
4.1 Entrapment
Entrapment by definition is “a law enforcement officer’s or
government agent’s inducement of a person to commit a
crime, by means of fraud or undue persuasion, in an attempt
to bring a criminal prosecution against that person”.
Entrapment is only a legal defense and not something that
you can sue someone for. This means that, it is used y
defendent toavoidconviction.Theentrapmentissueemerges
with honeypots on the grounds that the honeypot os to draw
in attackers. This is similar to law enforcement using
undercover agents taking on the appearance of drug dealers
to attract and catch drug users. There are some huge
differences however. There is no recruitment of individuals
to interface with honeypot nor is there any connection with
the clients that are co-operating with the honeypot. As there
are no interaction with individual, it makes the defense of
entrapment hard to set up.
4.2 Privacy
The issue revolving around privacy can be complicated.
Privacy concentrates on the confidentiality of data. At the
point when a network operator monitors the utilization of
the system, the users fundamentally lose some measure of
privacy.
There are two types of information totrack,operational data
and transactional data.Operational data includessuchthings
as the address of the user, header information, etc, while the
transactional data includes such information key strokes,
pages visited, information downloaded,chatrecords,emails,
etc. Most operational data is safe to track without the threat
of privacy concerns as there are several different systems
out there that track this information already such as IDS
systems, routers, and firewalls. The major concern is the
transactional data. The obvious comparison is to the phone
company. The phone company has every right to privately
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1203
track what phone calls you make and for howlong;however,
it would be illegal for them, without a federal warrant, to
listen to or tape your phone conversation. The more content
a honeypot tracks, the more privacy concernsaregenerated.
4.3 Liability
Another legal issue relative to honeypots is the liability. If a
honeypot is breached and then is used to attack the systems
of another organization, then that honeypot operator could
be held liable in a suit brought by downstream victims.
Although the harm was inflicted by the intruder rather than
the operator, if the honeypot had been secure, then the
intruder would not have been able to use it to inflict damage
on others.
There are a few steps an organization can considertoreduce
the risk. The objective is to make it as troublesome as
possible for an attacker to utilize your resources to hurt
different systems. Similarly as in Privacy, honeypots have
distinctive levels of risk. Low-interactionhoneypotshave far
less risk, as they don't give attacker a genuine working
system to interact with. Rather, they control the actions of
attackers using emulated services. High-interaction
honeypots, are different, they give real working system to
attacker to communicate with. Subsequently, most high-
communication honeypots have more serious risk.
5. HONEYNET
A honeynet is a system set up withdeliberatevulnerabilities;
its motivation is to welcome assault, so that an attacker’s
exercises and strategies can be considered and that data
used to build arrange security. A honeynet contains at least
one honeypots, which are PC frameworks on the Internet
explicitly set up to draw in and "trap" individuals who
endeavor to infiltrate other individuals' PC frameworks. In
spite of the fact that the main role of a honeynet is to
assemble data about attacker's strategiesandintentions,the
fake system can profit its administrator in different courses,
for instance by occupying assailants from a genuine system
and its assets.
In addition to the honey pots, a honeynet has genuine
applications and services with the goal that it appears like a
typical system and an advantageous target.
The Honeynet Project, a non-benefitorganizationcommitted
to PC security and data sharing, effectively promotes the
deployment of honeynets. The associationkeepsonbeing on
the bleeding edge of security research by attempting to
dissect the most recent assaults and instructing people in
general about dangers to data frameworks over the world.
Established in 1999, The Honeynet Project has added to
battle against malware and malignant hacking assaults and
has grown to include 30 members ofthesecuritycommunity
from Canada, Israel, Netherlands, Germany, Australia, and
United States.
Fig 6: Honey net setup with four honeypots & honey wall
6. CONCLUSIONS
Over the Past few years, the need to improve the network
security has arised. To achieve this security, honeypots can
be used. They are extremely useful ascountermeasuresfrom
intruders attacks on systems.So that, the security
professionals and researchers can know the person with
whom they are and insure the network security is always
achieved with the rapid changes in network attacks.
But if the attackers knows about such system or bypasses it
then, the whole mechanism is meaningless. Therefore, this
fact need to be considered and develop a honeypot in such a
way that attacker will definitely believe that it is a original
system and not a trap.
REFERENCES
[1] L. Spitzner, “Honeypots: Tracking Hackers”,2002
[2] Wikipedia.
http://en.wikipedia.org/wiki/Honeypot_(computing)
[3] Navneet Kambow, Lavleen Kaur Passi, “Honeypots: The
Need of Network Security”, Vol. 5 (5), 6098-6101, 2014
[4] Aaditya Jain, Dr. Bala Buksh, “Advance Trends in
Network Security with Honeypot and its Comparative
Study with other Techniques”, V29(6),304-312
November 2015
[5] Sandeep Chaware, “Banking Security using Honeypot”,
IJSIA Vol. 5, No.1, 2011
[6] The Honeynet Project,
https://www.honeynet.org/about
[7] Aaditya Jain , Bhuwnesh Sharma , Pawan Gupta,
“Honeypot: An External Layer Of Security Against
Advance Attacks On Network”,IJIRSE,Vol.No.2,Issue04,
April 2016
[8] Honeypot System,
https://www.sans.org/security-resources/idfaq/what-
is-a-honeypot/1/9
[9] https://www.sans.edu/cyber-research/security-
laboratory/article/honeypots-guide
[10] Muhammet Baykara, Resul Daş, “A Survey on Potential
Applications of Honeypot Technology in Intrusion
Detection Systems”, Volume 2, Issue 5, September –
October 2015
[11] Abhilash Verma, "Production Honeypots: An
Organization’s view", October 2003

More Related Content

What's hot

How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
Yury Chemerkin
 

What's hot (19)

50120140501013
5012014050101350120140501013
50120140501013
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
Icmis
IcmisIcmis
Icmis
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
IDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in CloudIDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in Cloud
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
 
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION...
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION...STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION...
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION...
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Network security
Network securityNetwork security
Network security
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Stuxnet
StuxnetStuxnet
Stuxnet
 

Similar to Review on Honeypot Security

A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 

Similar to Review on Honeypot Security (20)

Detect Network Threat Using SNORT Intrusion Detection System
Detect Network Threat Using SNORT Intrusion Detection SystemDetect Network Threat Using SNORT Intrusion Detection System
Detect Network Threat Using SNORT Intrusion Detection System
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET-  	  Web Application Firewall: Artificial Intelligence ARCIRJET-  	  Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
M0704071074
M0704071074M0704071074
M0704071074
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

Review on Honeypot Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1200 Review on Honeypot Security Satish Mahendra Kevat Student, Department Of MCA, Vivekanand Education Society's Institute of Technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A honeypot is a PC framework that is set up togo about as an imitation to baitcyberattackers, andtorecognize, divert or think about endeavorstoincreaseunapprovedaccess to data frameworks. it comprises of a PC, applications, and information that recreate the behavior of a genuine system that appears to be part of a network but is actually isolated and closely observed. All interchanges with a honeypot are viewed as hostile, as there's no explanation behind genuine clients to get to a honeypot. On the off chance that a honeypot is effective, the attacker will have no clue that she/he is being deceived and observed. Key Words: Honeypot,IDS,Attack Finder,Deflector,Firewall 1. INTRODUCTION There has been a significant increase in the number of users that are connecting to the internet day by day, with this increase in user’s , the malicious intrusions and risk is also increasing.Various systems are being implemented to detect this intrusions and honeypot is one such intrusion detecting system. In computer technology, a honeypot is atrapsettorecognize, redirect or in some way balance endeavors at unapproved utilization of data frameworks. Its principle point does not include a snare for black hat community but rather the concentration lies in quiet accumulation of data as possible about their pattern, programs utilized andreasonforassault. Honeypot creates a log which refers to an intrusive activity by detecting intruders. It also helps to reduce the risks of security breaches. Fig 1: Simple Honeypot 1.1 Where to place honeypot Honeypots can be placed in any of the three areas in organization; they can be placed externally on theinternetor internally on the intranet. Fig 2: Placement of Honeypot 1.1.1 In front of firewall When using in front of the firewall (i.e internet), it does not affect internal network, which reduces the risk of compromising the internal system. Inthiskindofplacement, when attacker attacks, the firewall does not create the log and thus, there will be difficulty in locating internal attackers. 1.1.2 Behind the firewall When using behind the firewall, it keeps the of internal attackers activities and also helps in identifying misconfigured firewall. But being inside the network, some security risks arises, if the internal network is not secured with some additional security mechanism. 1.1.3 DMZ By placing honeypot insidea DMZ(Demilitarizedzone)itself create a great level of securitywithflexible environment. But to use in DMZ, it may require some expert knowledge because it involves some complex hardwares. Thus, honeypot can be placed behind the firewall only if we want to detect the internal attacks or else, it can be placed outside the firewall.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1201 1.2 Building a VM based honeypot To assemble a honeypot, An arrangementofvirtualmachines (VMs) are made. They are then setup on a private system with the host OS. To encourage informationcontrol,astateful firewall, for example, IPTables can be utilized to log connections. This firewall would regularly be designed in Layer 2 crossing over mode, rendering it straightforward to the attacker. The last step is information catch, for which tools such as Sebek and Term Log can be utilized. When information has been caught, investigation on the information can be performed utilizing tools such as Honey Inspector, PrivMsg and Sleuth Kit. This approach is found to be remarkable in its simplicity and feel that a few significant issues need to be brought to light. 1. The choice of a private host-only network. Though this may seem counter intuitive at first, there is a relatively sound reasoning for doing so. 2. While bridging the VMs on to the physical network would seem like a better approach because it transparently forwards packets to the VMs and eliminates an additional layer of routing, it requires an additional data control device which will monitor thepackets being sent fromthe VMs.The operation of data control cannot be performed by the host OS when the VMs are in bridged mode, since all data from the VMs bypass any firewalls or IDSs which exist at the application layer on the host, as shown in the fig 2 below. Fig 3: Structure of A VM Based Honeypot 3. The firewall on the host should be transparent to the attacker. This requires considerable effort,sincefirewallsby default work at Layer 3 or greater. To render the firewall transparent to the attacker requires recompilation of the kernel. This may not be conceivableon every OS, for example, Windows. At long last, once a honeypot is breached, a rebuilding component must be implemented with the goal that it is in a split second removed from the system and thoroughly checked before putting it back on the system. This is as of now a manual procedure and can only be partly automated. 2. POINTS TO CONSIDER WHILE IMPLEMENTING A HONEYPOT 2.1 Intent of using: There are 2 purpose of using honeypot: Early warning and forensic analysis. Early warning honeypots are easy and simple to setup and are more efficient in catching hackers and malware than other systems. This honeypothelps to detect and identifythe attacker with merely a single connection with it. Forensic analysis honeypot capture and isolate the malware and attacker’s tools, and reports the user to create a plan in several days while analysing the attackers captured data. 2.2 Interaction level: Based on the interactionwiththeattackerhoneypotisnamed as low, medium and high interaction. Low interaction honeypot are intended to imitatevulnerable services and identify attacker’s assault without uncovering full operating system functionalities. Medium interaction honeypot are further capable of emulating full services or specific vulnerabilities and may contain basic file structures. High interaction honeypot mainly emulates the full system and it’s capabilities, and are useful for forensic analysis because it may trick the attacker to reveal their more tricks. 2.3 To be deployed on real system or emulation software: Real systems are best to use because the attacker is having difficulty in differentiating between the genuine system and honeypot. For real systems, oldcomputerscanbeused.Butif we want a low- risk, and quick installation honeypot, emulation software can be used. 2.4 Honeypot administrator: Honeypot administrator is the person responsible for maintaining the honeypot. This person should install, run, update and maintain the honeypot. If honeypot is not updated and maintained, then it become useless and a jumping off spot for attacker’s. 2.5 Updating the data: If we use high interaction honeypot, it requires continuous updation of data into honeypot , to make it look real. Thiscan be done in sometimemanually or canbeupdatedusingsome software or copy programs.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1202 3. Other Security techniques 3.1 Firewall Firewall defines a single entry/exit point that keeps unapproved clients out of the secured network, denies possibly helpless services from entering or, then again leaving the system and gives security from different sorts of IP mocking and directing assaults. Fig 4: Simple Firewall Deployment Single gag point rearranges security administration since security abilities are merged on a single system or set of systems. The firewall itself is immune to entrance. This implies that utilizationoftrustedsystem withsecure working OS. A firewall is a collaboration software and hardware which separates an organizations internal network and other networks. Firewalls cannotpreventtheattacksfrominternal system (intranet). 3.2 Intrusion Detection system (IDS) Fig 5 : Simple IDS Deployment An intrusion detection system (IDS) checks network traffic and searches for any suspicious or irregular activity and alerts the system or system administrator. At times the IDS may likewise react to irregular or malicious activity by making a move, for example, blocking the client or source IP address from getting to the system. IDS are simple to implement as it does not affect existing systems. Generally, there are 2 types of IDS: 3.2.1 Host IDS (HIDS) HIDS system runs on the host machine or devices which detect malicious activity on that host. The HIDS monitors the messages/packets and report to the user of any suspicious activity. 3.2.2 Network IDS (NIDS) NIDS operate on the net- work between the devices. This system monitors the data traffic between this devices in the network for any irregularities or malicious activity. This systems are responsible for monitoring and reporting of entire network rather than a single host. 4. LEGAL ISSUES WITH HONEYPOT Before using and deploying honeypot, we must understand the legal issues involved with it. The following issues can affect the owner of honeypot: 4.1 Entrapment Entrapment by definition is “a law enforcement officer’s or government agent’s inducement of a person to commit a crime, by means of fraud or undue persuasion, in an attempt to bring a criminal prosecution against that person”. Entrapment is only a legal defense and not something that you can sue someone for. This means that, it is used y defendent toavoidconviction.Theentrapmentissueemerges with honeypots on the grounds that the honeypot os to draw in attackers. This is similar to law enforcement using undercover agents taking on the appearance of drug dealers to attract and catch drug users. There are some huge differences however. There is no recruitment of individuals to interface with honeypot nor is there any connection with the clients that are co-operating with the honeypot. As there are no interaction with individual, it makes the defense of entrapment hard to set up. 4.2 Privacy The issue revolving around privacy can be complicated. Privacy concentrates on the confidentiality of data. At the point when a network operator monitors the utilization of the system, the users fundamentally lose some measure of privacy. There are two types of information totrack,operational data and transactional data.Operational data includessuchthings as the address of the user, header information, etc, while the transactional data includes such information key strokes, pages visited, information downloaded,chatrecords,emails, etc. Most operational data is safe to track without the threat of privacy concerns as there are several different systems out there that track this information already such as IDS systems, routers, and firewalls. The major concern is the transactional data. The obvious comparison is to the phone company. The phone company has every right to privately
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1203 track what phone calls you make and for howlong;however, it would be illegal for them, without a federal warrant, to listen to or tape your phone conversation. The more content a honeypot tracks, the more privacy concernsaregenerated. 4.3 Liability Another legal issue relative to honeypots is the liability. If a honeypot is breached and then is used to attack the systems of another organization, then that honeypot operator could be held liable in a suit brought by downstream victims. Although the harm was inflicted by the intruder rather than the operator, if the honeypot had been secure, then the intruder would not have been able to use it to inflict damage on others. There are a few steps an organization can considertoreduce the risk. The objective is to make it as troublesome as possible for an attacker to utilize your resources to hurt different systems. Similarly as in Privacy, honeypots have distinctive levels of risk. Low-interactionhoneypotshave far less risk, as they don't give attacker a genuine working system to interact with. Rather, they control the actions of attackers using emulated services. High-interaction honeypots, are different, they give real working system to attacker to communicate with. Subsequently, most high- communication honeypots have more serious risk. 5. HONEYNET A honeynet is a system set up withdeliberatevulnerabilities; its motivation is to welcome assault, so that an attacker’s exercises and strategies can be considered and that data used to build arrange security. A honeynet contains at least one honeypots, which are PC frameworks on the Internet explicitly set up to draw in and "trap" individuals who endeavor to infiltrate other individuals' PC frameworks. In spite of the fact that the main role of a honeynet is to assemble data about attacker's strategiesandintentions,the fake system can profit its administrator in different courses, for instance by occupying assailants from a genuine system and its assets. In addition to the honey pots, a honeynet has genuine applications and services with the goal that it appears like a typical system and an advantageous target. The Honeynet Project, a non-benefitorganizationcommitted to PC security and data sharing, effectively promotes the deployment of honeynets. The associationkeepsonbeing on the bleeding edge of security research by attempting to dissect the most recent assaults and instructing people in general about dangers to data frameworks over the world. Established in 1999, The Honeynet Project has added to battle against malware and malignant hacking assaults and has grown to include 30 members ofthesecuritycommunity from Canada, Israel, Netherlands, Germany, Australia, and United States. Fig 6: Honey net setup with four honeypots & honey wall 6. CONCLUSIONS Over the Past few years, the need to improve the network security has arised. To achieve this security, honeypots can be used. They are extremely useful ascountermeasuresfrom intruders attacks on systems.So that, the security professionals and researchers can know the person with whom they are and insure the network security is always achieved with the rapid changes in network attacks. But if the attackers knows about such system or bypasses it then, the whole mechanism is meaningless. Therefore, this fact need to be considered and develop a honeypot in such a way that attacker will definitely believe that it is a original system and not a trap. REFERENCES [1] L. Spitzner, “Honeypots: Tracking Hackers”,2002 [2] Wikipedia. http://en.wikipedia.org/wiki/Honeypot_(computing) [3] Navneet Kambow, Lavleen Kaur Passi, “Honeypots: The Need of Network Security”, Vol. 5 (5), 6098-6101, 2014 [4] Aaditya Jain, Dr. Bala Buksh, “Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques”, V29(6),304-312 November 2015 [5] Sandeep Chaware, “Banking Security using Honeypot”, IJSIA Vol. 5, No.1, 2011 [6] The Honeynet Project, https://www.honeynet.org/about [7] Aaditya Jain , Bhuwnesh Sharma , Pawan Gupta, “Honeypot: An External Layer Of Security Against Advance Attacks On Network”,IJIRSE,Vol.No.2,Issue04, April 2016 [8] Honeypot System, https://www.sans.org/security-resources/idfaq/what- is-a-honeypot/1/9 [9] https://www.sans.edu/cyber-research/security- laboratory/article/honeypots-guide [10] Muhammet Baykara, Resul Daş, “A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems”, Volume 2, Issue 5, September – October 2015 [11] Abhilash Verma, "Production Honeypots: An Organization’s view", October 2003