Honeypot in the Cyber Space
DOI:
https://doi.org/10.53573/rhimrj.2025.v12n4.011Keywords:
honeypot, cloud security, DDoS, optimization techniqueAbstract
In today’s world a large number of devices are connected to the network, which indicates that there could exist more access nodes than before from where an intruder can try to attack and gain access to the network and its connected devices. As technology is evolving rapidly it’s difficult to keep pace with the latest trends in cyber space. The already existing defense mechanisms that have been used traditionally are falling behind to keep pace with the evolutions in the field of cyber security. In the recent times every device we own is somehow connected to the network. Thus, a greater number of cyber threats are evolving rapidly and the traditional mechanisms are not at par with the current trends like firewalls, (IDS) intrusion detection system and (IPS)intrusion prevention system. This paper presents a comprehensive study on the life cycle of honeypot systems, emphasizing planning, deployment, operation, data collection, analysis, maintenance, and evolution phases. It also discusses the different types of honeypots based on interaction levels and deployment methods, highlighting inherent challenges and considerations in modern cybersecurity infrastructures. This paper throws light on the life cycle of a honeypot and its implementation as a telnet honeypot. That is used to record any unauthorized login attempts and create log files that can be used for further analysis about the attacks performed on the honeypot. The honeypot shows a telnet vulnerability that could be used for remote login which can be easily found by an intruder and not to the public. Further the honeypot records the activity, attacks and more in the form of logs.
References
A Review on Honeypots Manikandan K1, Shambhavi Rai21Associate Professor, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India2Student, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
Rajbhar, Vivekanand. “INTRUSION DETECTION&PREVENTION USING HONEYPOT.” InternationalJournal of Advanced Research in Computer Science 9.4(2018).
Fraunholz, Daniel, Marc Zimmermann, and Hans D.Schotten. “An adaptive honeypot configuration,Deployment and maintenance strategy.” 2017 19thInternational Conference on AdvancedCommunication Technology (ICACT). IEEE, 2017.
Abdullahi, Mukhtar Ahmad, S. Aliyu, and S. B. Junaidu.“AN ENHANCED INTRUSION DETECTION SYSTEMUSING HONEYPOT AND CAPTCHA TECHNIQUES.FUDMA JOURNAL OF SCIENCES-ISSN: 2616-1370 3.3(2019): 202-209.
Toor, Jashanpreet Singh, and Er Abhinav Bhandari.“DEPLOYMENT OF LOW INTERACTION HONEYPOT INA PRIVATE NETWORK.” International Journal ofAdvanced Research in Computer Science 8.7 (2017).
Sekar, K. R., et al. “Dynamic Honeypot ConfigurationFor Intrusion Detection.” 2018 2nd InternationalConference on Trends in Electronics and Informatics(ICOEI). IEEE, 2018
Campbell, Ronald M., Keshnee Padayachee, and Themba Masombuka. “A survey of honeypot research:Trends and opportunities.” 2015 10th internationalConference for internet technology and securedTransactions (ICITST). IEEE, 2015.
Kakade, Nilesh, et al. “JAVA Based Honeypot: IntrusionDetection System.” (2018).
La, Quang Duy, et al. “Deceptive attack and defense Game in honeypot-enabled networks for the internet Of things.” IEEE Internet of Things Journal 3.6 (2016):1025-1035.
Kevat, Satish Mahendra. “Review on HoneypotSecurity.” International Research Journal ofEngineering and Technology (IRJET) 4.06 (2017):1200-1203.
Kumar, Dinesh, and Akshay Girdhar. “Network Monitoring & analysis along with comparative study Of honeypots.” 2017 International Conference on Intelligent Sustainable Systems (ICISS).IEEE, 2017.
https://ieeexplore.ieee.org/document/10212345
L. Spitzner, "Honeypots: Tracking Hackers," Addison-Wesley, 2003.
N. Provos and T. Holz, "Virtual Honeypots: From Botnet Tracking to Intrusion Detection," Addison-Wesley, 2007.
Y. Zeng, K. Lee, and H. Chen, "Telnet Honeypots for IoT Security," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8469-8481, Oct. 2019.
M. K. Rogers et al., "DDoS Attack Detection and Mitigation Using Honeypots," in Proc. IEEE ICC, 2018, pp. 1-7.