Affiliation:
1. National Institute of Technology Kurukshtra, India
Abstract
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.
Reference88 articles.
1. Wireless Rogue Access Point Detection Using Shadow Honeynet
2. Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.;M.Akiyama;Computer Science,2017
3. Assessing the security of the cloud environment
4. Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes
5. Android (n.d.) Android architecture. Android. Retrieved from: https://source.Android.com/Security/
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Potential Threats of Social Engineering Practices to Social Work;Handbook of Research on Policies, Protocols, and Practices for Social Work in the Digital World;2021
2. Analyse und Klassifikation von Voice Over IP-Angriffsdaten mit „ClustSEN“;Neue Algorithmen für praktische Probleme;2021