{"id":66469,"date":"2022-06-06T10:12:46","date_gmt":"2022-06-06T10:12:46","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66469"},"modified":"2022-06-06T10:13:31","modified_gmt":"2022-06-06T10:13:31","slug":"honeypot-a-weapon-for-cyber-combat","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66469","title":{"rendered":"Honeypot &#8211; a weapon for cyber combat"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;100575&#8243;]Paulo V. Monteiro, Assistant Professor at ISTEC Porto<br \/>\nJo\u00e3o Em\u00edlio Almeida, Assistant Professor at ISTEC Porto<br \/>\nDiogo Cunha, Student at ISTEC-Porto<br \/>\nDiana Rodrigues, Student at ISTEC-Porto[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2022%2F06%2FPauloMonteiro_HoenyPots_v1-EN-2.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;137949&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;141842&#8243;]Paulo V. Monteiro,Jo\u00e3o Em\u00edlio Almeida, Diogo Cunha e Diana Rodrigues,\u00a0<b>CHoneypot &#8211; a weapon for cyber combat<\/b><\/p>\n<p>DOI: 10.31112\/kriativ-tech-2022-06-71[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;437778&#8243;]In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;153259&#8243;]Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;180185&#8243;][1] Misa, Thomas J. (2016). &#8220;Computer Security Discourse at RAND, SDC, and NSA (1958-1970)&#8221;. IEEE Annals of the History of Computing. 38 (4): 12\u201325. doi:10.1109\/MAHC.2016.48. S2CID 17609542.<br \/>\n[2] The Portuguese News (2022). \u201cHospital target of cyberattack\u201d. https:\/\/www.theportugalnews.com\/news\/2022-04-26\/hospital-target-of-cyberattack\/66614 consulted on May 7, 2022.<br \/>\n[3] Silicon Republic (2022). \u201cTargeted cyberattack takes out Vodafone Portugal\u201d. https:\/\/www.siliconrepublic.com\/enterprise\/vodafone-portugal-cyberattack, consulted on May 7, 2022.<br \/>\n[4] Cybernews (2022). \u201cMajor Portuguese media conglomerate hit by ransomware\u201d. https:\/\/cybernews.com\/news\/major-portuguese-media-conglomerate-hit-by-ransomware\/, , consulted on January 15, 2022.<br \/>\n[5] Reuters (2022). \u201cPortugal&#8217;s largest retailer&#8217;s websites, some services hit by hackers\u201d. https:\/\/www.reuters.com\/technology\/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30\/, consulted on May 7, 2022.<br \/>\n[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.<br \/>\n[7] Cheswick, Bill (1992). &#8220;An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied&#8221; (PDF). http:\/\/cheswick.com\/ches\/papers\/berferd.pdf Retrieved 3 Feb 2022.<br \/>\n[8] Singh, R. K., &amp; Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.<br \/>\n[9] Nicomette, V., Ka\u00e2niche, M., Alata, E., &amp; Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.<br \/>\n[10] Mokube, I., &amp; Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).<br \/>\n[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paulo V. Monteiro, Assistant Professor at ISTEC Porto<br \/>\nJo\u00e3o Em\u00edlio Almeida, Assistant Professor at ISTEC Porto<br \/>\nDiogo Cunha, Student at ISTEC-Porto<br \/>\nDiana Rodrigues, Student at ISTEC-Porto<br \/>\nDOI: 10.31112\/kriativ-tech-2022-06-71<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66469"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66469"}],"version-history":[{"count":2,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66469\/revisions"}],"predecessor-version":[{"id":66472,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66469\/revisions\/66472"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}