2022
DOI: 10.3390/app12105224
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots

Abstract: To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone to attacks—is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real systems. Its usefulness lies in being able to operate without being identified as a trap by adversaries; otherwise, its values are significantly reduced. A honeypot is commonly classified by the degree of interactions that they provide to the attacker: low, mediu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 29 publications
(60 reference statements)
0
2
0
Order By: Relevance
“…This command typically prints "ok" on the screen; however, it is likely being used in attacker scripts to check if the shell environment responds to basic commands such as echo with an ASCII representation of hex characters. This finding correlates with research by Touch and Colin on commands executed within various honeypots on the Internet [30].…”
Section: Command Analysissupporting
confidence: 88%
“…This command typically prints "ok" on the screen; however, it is likely being used in attacker scripts to check if the shell environment responds to basic commands such as echo with an ASCII representation of hex characters. This finding correlates with research by Touch and Colin on commands executed within various honeypots on the Internet [30].…”
Section: Command Analysissupporting
confidence: 88%
“…Moreover, the experienced attacker can detect the honeypot system and then use it as jumping hop instead of stopping stone. Hence, it professionals need extra security measures to prevent honeypot exploitation [11], [12].…”
Section: Low-interaction Honeypotsmentioning
confidence: 99%
“…These honeypots and honeynets have an expanded repertoire of behavioral and architectural changes as a result. Semantically, the research [35,36,37] often mixes and combines the four terms as a reflection of the adaptive nature in these honey systems. Yet, even adaptive honeypots and honeynets rely on human intervention at various points in their lifecycle.…”
Section: Adaptivementioning
confidence: 99%