liu.seSearch for publications in DiVA
Change search
ReferencesLink to record
Permanent link

Direct link
Contributions of honeyports to network security
Linköping University, Department of Computer and Information Science.
2007 (English)Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
Abstract [en]

A honeypot is an attractive computer target placed inside a network to lure the attackers into it. There are many advantages of this technology, like, information about attacker's tools and techniques can be fingerprinted, malicious traffic can be diverted away from the real target etc. With the increased activity from the blackhat community day by day, honeypots could be an effective weapon in the

network security administrator's armor. They have been studied rigorously during the past few years as a part of the security

industry's drive to combat malicious traffic. While the whitehats are trying to make honeypots stealthier, blackhats are coming up with techniques to identify them (therefore nullifying any

further use) or worse, use them in their favor. The game is on. The goal of this thesis is to study different architectural issues regarding honeypot deployment, various stages in utilizing honeypots like forensic analysis etc. Other concepts like IDSs and firewalls which are used in conjunction with honeypots are also discussed, because security is about cooperation among different security components. In the security industry, it is customary for whitehats to watch what blackhats are doing and vice versa. So the thesis

discusses recent techniques to defeat honeypots and risks involved in deploying honeypots. Commercial viability of honeypots and business cases for outsourcing honeypot maintenance are presented. A great interest from the security community about honeypots has propelled the research and resulted in various new and innovative applications of honeypots. Some of these applications, which made an impact, are discussed. Finally, future directions in research in honeypot technology are perused.

Place, publisher, year, edition, pages
Institutionen för systemteknik , 2007. , 46 p.
Keyword [en]
Honeypot, honeynet, cyber-deception, IDS
National Category
Computer Science
URN: urn:nbn:se:liu:diva-9177ISRN: LiTH-ISY-EX--07/3686--SEOAI: diva2:23790
2006-11-17, Donald Knuth, B, campus valla, linköping, 10:15
Available from: 2007-06-13 Created: 2007-06-13

Open Access in DiVA

fulltext(1227 kB)1332 downloads
File information
File name FULLTEXT01.pdfFile size 1227 kBChecksum MD5
Type fulltextMimetype application/pdf

By organisation
Department of Computer and Information Science
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 1332 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 1568 hits
ReferencesLink to record
Permanent link

Direct link