Abstract
This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Spitzner, L.: Honeypots: tracking attackers. Addison-Wesley, Boston (2002)
Simon, I.: Honeypots: How do you know when you are inside one? SCISSEC & Edith Cowan University (2006)
Krawetz, N.: Anti Honeypot Technology. IEEE Security and Privacy (2004)
Shiue, L.-M.: Counter measures for detection of Honeypot Deployment ICCCE (2008)
Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 7th edn. John Wiley & Sons, Chichester (2005)
Honeypot (computing), http://en.wikipedia.org/wiki/Honeypot_computing
Honeypot Intrusion Detection, Incident Response, http://www.honeypots.net/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Panchal, V.K., Bhatnagar, P.K., Bhatnagar, M. (2009). Pitcherpot: Avoiding Honeypot Detection. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_58
Download citation
DOI: https://doi.org/10.1007/978-3-642-03547-0_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03546-3
Online ISBN: 978-3-642-03547-0
eBook Packages: Computer ScienceComputer Science (R0)