Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Paulo V. Monteiro, Assistant Professor at ISTEC PortoJoão Emílio Almeida, Assistant Professor at ISTEC PortoDiogo Cunha, Student at ISTEC-PortoDiana Rodrigues, Student at ISTEC-Porto
Media
To cite this article
Paulo V. Monteiro,João Emílio Almeida, Diogo Cunha e Diana Rodrigues, CHoneypot - a weapon for cyber combatDOI: 10.31112/kriativ-tech-2022-06-71
Abstract
In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.
Keywords
Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.
References
[1] Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. S2CID 17609542.[2] The Portuguese News (2022). “Hospital target of cyberattack”. https://www.theportugalnews.com/news/2022-04-26/hospital-target-of-cyberattack/66614 consulted on May 7, 2022.[3] Silicon Republic (2022). “Targeted cyberattack takes out Vodafone Portugal”. https://www.siliconrepublic.com/enterprise/vodafone-portugal-cyberattack, consulted on May 7, 2022.[4] Cybernews (2022). “Major Portuguese media conglomerate hit by ransomware”. https://cybernews.com/news/major-portuguese-media-conglomerate-hit-by-ransomware/, , consulted on January 15, 2022.[5] Reuters (2022). “Portugal's largest retailer's websites, some services hit by hackers”. https://www.reuters.com/technology/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30/, consulted on May 7, 2022.[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.[7] Cheswick, Bill (1992). "An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied" (PDF). http://cheswick.com/ches/papers/berferd.pdf Retrieved 3 Feb 2022.[8] Singh, R. K., & Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.[9] Nicomette, V., Kaâniche, M., Alata, E., & Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.[10] Mokube, I., & Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).