Approaches for Preventing Honeypot Detection and Compromise

Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Scopus citations

Abstract

Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.

Original languageEnglish
Title of host publication2018 Global Information Infrastructure and Networking Symposium, GIIS 2018
ISBN (Electronic)9781538672723
DOIs
StatePublished - Jul 2 2018
Event2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 - Thessaloniki, Greece
Duration: Oct 23 2018Oct 25 2018

Publication series

Name2018 Global Information Infrastructure and Networking Symposium, GIIS 2018

Conference

Conference2018 Global Information Infrastructure and Networking Symposium, GIIS 2018
Country/TerritoryGreece
CityThessaloniki
Period10/23/1810/25/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Detection
  • honeypot
  • protocol
  • security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Approaches for Preventing Honeypot Detection and Compromise'. Together they form a unique fingerprint.

Cite this