Title :
Deception Methodology in Virtual Honeypots
Author :
Qassrawi, Mahmoud T. ; Hongli, Zhang
Author_Institution :
Comput. Sci. & Technol. Sch., Harbin Inst. of Technol. (HIT), Harbin, China
Abstract :
The great advance in attacks against network has led to outgrowth of interest in more aggressive forms of defense to supplement the existing security approaches. One of these techniques involves the use of the deception to collect information about attacks. A honeypot is a security deception resource whose value lies in being probed, attacked or compromised. In this paper we present an overview of techniques used by honeypots to deceive the attacker and attacking process, and provide a comparison for persons who are interested in study and developing this new technology. We examine various types of honeypots, and deception techniques they use to counter attacks.
Keywords :
security of data; deception methodology; security deception resource; virtual honeypots; Computer networks; Wireless communication; Deception; emulation; honeynets; honeypot; intrusion detection; virtual honeypots;
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
DOI :
10.1109/NSWCTC.2010.266