p { margin-bottom: 0.25cm; line-height: 120%; }

A honeypot is a
system software that is usually designed with the aim of detecting
and trapping any attempt to penetrate into an experimental system. It
acts as masquerade to the attacker. If the attacker breaks into the
system or server, then the honeypot that resembles the original
server will be assaulted by the attack, while the actual system
remains safe and untouched as a server behind the honeypot. For those
who are not experienced attackers, they tend to think that they have
easily managed to hack the system / server. However, all actions,
tools, and techniques used in the attack have been recorded for study
by the System Administrator (Sysadmin) concerned through the
data and information
presented by the honeypot The role of the honeypot is not solving a
problem faced by the
server, but it contributes in terms of overall security based on the
level of involvement. The level of involvement measures the degree of
interaction of an attacker with the
information system
which consists of three types, namely a low-involvement honeypot,
medium- and high-involvement honeypot. The low-involvement honeypot
is the most
easily installed and
maintained because of the simple design and basic functionality. A
medium-
involvement honeypot
provides greater interaction capabilities when compared with the low-
involvement honeypot
but its functionality is still less than the high-involvement
honeypot.
A high-involvement
Honeypot uses honeyspot technology (a mixture of ‘honeypot’ and
WiFi
‘hotspot’) that
provides a lot of information about the attackers but it takes time
to obtain it. The purpose of the high-involvement honeyspot is to
provide access to a real operating system to attack where there is no
limit set . The following is the process of how honeypots can capture
the attack as a sequence of communication networks between the
attacker and the victim. The most important issue is to configure a
network honeypot-honeypot in large organisations by using programs
based on the current server and a network scanner. The solution to
the challenge of cost-effectiveness in analysing the volume of
important data for the large amounts is by applying an aggregation
process that integrates current and a data network honeypot. This
solution is integrated into a complete framework to facilitate
deployment of the honeypot and to analyse the attacks.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now
Author