5Honeypot: A Trap for Attackers

Anjanna Matta1*, G. Sucharitha3, Bandlamudi Greeshmanjali1, Manji Prashanth Kumar2 and Mathi Naga Sarath Kumar2

1FST, ICFAI Foundation For Higher Education, Donthanapally, Hyderabad, India

2Institute of Aeronautical Engineering, Hyderabad, India

3Department of CSE, NIIT University, Neemrana, India

Abstract

Day by day, usage of the internet is gradually increasing all over the world. The Internet has become part of everyone’s life. People are surfing over the internet, sending and checking emails, purchasing goods, booking tickets online, etc. But most of the people who use the internet don’t know about the internet security and how their system can be hacked by the attacker. Network security is a key point to get over all these problems. Network forensics is usually used to identify an attacker’s activity and to evaluate their behaviour. Collection of data is the major role of network forensics and honeypots are used to collect the valuable data in network forensics. This research chapter introduces Honeypot, an existing technology for Network Security. This research chapter deals with the basic aspects of Honeypots, their importance in modern networks, types of honeypots and their level of interaction, advantages and disadvantages of honeypots. Furthermore, the research chapter also discusses about how honeypots enhance the security architecture of a network.

Keywords: Honeypot, network security, network forensics, hacking

5.1 Introduction ...

Get The New Advanced Society now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.