Abstract
Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.
Original language | English |
---|---|
Title of host publication | 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 |
ISBN (Electronic) | 9781538672723 |
DOIs | |
State | Published - Jul 2 2018 |
Event | 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 - Thessaloniki, Greece Duration: Oct 23 2018 → Oct 25 2018 |
Publication series
Name | 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 |
---|
Conference
Conference | 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 |
---|---|
Country/Territory | Greece |
City | Thessaloniki |
Period | 10/23/18 → 10/25/18 |
Bibliographical note
Publisher Copyright:© 2018 IEEE.
Keywords
- Detection
- honeypot
- protocol
- security
ASJC Scopus subject areas
- Computer Networks and Communications
- Hardware and Architecture
- Information Systems
- Information Systems and Management