Current State of Honeypots and Deception Strategies in Cybersecurity

被引:13
|
作者
Zobal, Lukas [1 ]
Kolar, Dusan [1 ]
Fujdiak, Radek [1 ]
机构
[1] Brno Univ Technol, Antoninska 548-1, Brno 60190, Czech Republic
关键词
honeypot; honeynet; deception; cybersecurity; threat intelligence;
D O I
10.1109/icumt48472.2019.8970921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize it's advantages and disadvantages, as well as legal and ethical issues. We classify honeypots to different categories and present examples of both actively developed honeypots and ones that had a significant impact. Finally, we discuss the current challenges in this field.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] The Credential is Not Enough: Deception with Honeypots and Fake Credentials
    Cromp, Sonia
    Bilinski, Mark
    Gabrys, Ryan
    Sala, Frederic
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 234 - 254
  • [2] Threat intelligence using Digital Twin honeypots in Cybersecurity
    Nintsiou, Maria
    Grigoriou, Elisavet
    Karypidis, Paris Alexandros
    Saoulidis, Theocharis
    Fountoukidis, Eleftherios
    Sarigiannidis, Panagiotis
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 530 - 537
  • [3] Challenges to Cybersecurity: Current State of Affairs
    Sen, Ravi
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2018, 43 : 22 - 44
  • [4] Cybersecurity: Current State of Governance Literature
    Mandani, Aurelia
    Ramirez, Ronald
    25TH AMERICAS CONFERENCE ON INFORMATION SYSTEMS (AMCIS 2019), 2019,
  • [5] Cybersecurity Deception Experimentation System
    Acosta, Jaime C.
    Basak, Anjon
    Kiekintveld, Christopher
    Leslie, Nandi
    Kamhoua, Charles
    2020 IEEE SECURE DEVELOPMENT (SECDEV 2020), 2020, : 34 - 40
  • [6] Deception: Technologies and Strategy for Cybersecurity
    Yarali, Abdulrahman
    Sahawneh, Faris George
    4TH IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2019) / 3RD INTERNATIONAL SYMPOSIUM ON REINFORCEMENT LEARNING (ISRL 2019), 2019, : 110 - 120
  • [7] The current state of research on people, culture and cybersecurity
    Jeong, Jongkil Jay
    Oliver, Gillian
    Kang, Eunsuk
    Creese, Sadie
    Thomas, Peter
    Personal and Ubiquitous Computing, 2021, 25 (05) : 809 - 812
  • [8] Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots
    Katakwar, Harsh
    Aggarwal, Palvi
    Maqbool, Zahid
    Dutt, Varun
    FRONTIERS IN PSYCHOLOGY, 2020, 11
  • [9] Digital deception in cybersecurity: an information behaviour lens
    Dlamini, M. T.
    Venter, H. S.
    Eloff, J. H. P.
    Eloff, M. M.
    INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2020, 25 (04):
  • [10] The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
    Zarras, Apostolis
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,