Author : Yarlagadda Durga 1
Date of Publication :25th April 2018
Abstract: Honeypot is a computer security system that includes files, directories in it just like a real computer. The target of honeypot is to attract hackers to fall into it to watch their activities. It is a fake system that looks like a real system. They differ from other security systems since the aim of honeypot is not to find one solution to a particular problem, instead they are applicable for various security problems and finding several approaches for them.
Reference :
-
- Lance Spitzner: https://www.linkedin.com/in/lance-spitzner-0ab0ba1
- Clifford Stoll and Bill Cheswick: https://www.foo.be/cours/dess-20102011/honeypotintroduction/honeynet-intro.pdf
- Fred Cohen: https://www.symantec.com/connect/articles/valuehoneypots-part-two-honeypot-solutions-and-legal-issues
- https://krazytech.com/
- https://en.wikipedia.org/wiki/Honeypot_(computiing).
- https://infosecaddicts.com/advantagesvsdisadvantages-of-honeypots/
- http://www.divaportal.org/smash/get/diva2:327476/ful ltext01
- Snehil, Atul Tyagi, Rishi Kumar1, 2M.tech (CS & E), 3Assistant Professor (CS & E), Amity University,Noida: http://www.iraj.in/journal/journal_file/journal_pdf/3-174- 143867333032-40.pdf
- http://www.iformit.com
- https://hstreasures.com/honeypots-42433/
- https://blog.rapid7.com/2016/12/06/introduction-tohoneypots/
- https://link.springer.com/chapter/10.1007/3-540- 27301-8_20
- https://www.ijedr.org/papers/IJEDR1504100.pdf