Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Paulo V. Monteiro, Assistant Professor at ISTEC PortoJoão Emílio Almeida, Assistant Professor at ISTEC PortoDiogo Cunha, Student at ISTEC-PortoDiana Rodrigues, Student at ISTEC-Porto

Media

PDF

To cite this article

Paulo V. Monteiro,João Emílio Almeida, Diogo Cunha e Diana Rodrigues, CHoneypot - a weapon for cyber combatDOI: 10.31112/kriativ-tech-2022-06-71

Abstract

In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.

Keywords

Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.

References

[1] Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. S2CID 17609542.[2] The Portuguese News (2022). “Hospital target of cyberattack”. https://www.theportugalnews.com/news/2022-04-26/hospital-target-of-cyberattack/66614 consulted on May 7, 2022.[3] Silicon Republic (2022). “Targeted cyberattack takes out Vodafone Portugal”. https://www.siliconrepublic.com/enterprise/vodafone-portugal-cyberattack, consulted on May 7, 2022.[4] Cybernews (2022). “Major Portuguese media conglomerate hit by ransomware”. https://cybernews.com/news/major-portuguese-media-conglomerate-hit-by-ransomware/, , consulted on January 15, 2022.[5] Reuters (2022). “Portugal's largest retailer's websites, some services hit by hackers”. https://www.reuters.com/technology/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30/, consulted on May 7, 2022.[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.[7] Cheswick, Bill (1992). "An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied" (PDF). http://cheswick.com/ches/papers/berferd.pdf Retrieved 3 Feb 2022.[8] Singh, R. K., & Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.[9] Nicomette, V., Kaâniche, M., Alata, E., & Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.[10] Mokube, I., & Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).