Pitcherpot: Avoiding Honeypot Detection
This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker.
KeywordsPitcherpots Honeypots Honeypot firewalls TCP/IP protocol Black Hat community
Unable to display preview. Download preview PDF.
- 1.Spitzner, L.: Honeypots: tracking attackers. Addison-Wesley, Boston (2002)Google Scholar
- 2.Simon, I.: Honeypots: How do you know when you are inside one? SCISSEC & Edith Cowan University (2006)Google Scholar
- 3.Krawetz, N.: Anti Honeypot Technology. IEEE Security and Privacy (2004)Google Scholar
- 4.Shiue, L.-M.: Counter measures for detection of Honeypot Deployment ICCCE (2008)Google Scholar
- 5.Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 7th edn. John Wiley & Sons, Chichester (2005)Google Scholar
- 6.Honeypot (computing), http://en.wikipedia.org/wiki/Honeypot_computing
- 7.Honeypot Intrusion Detection, Incident Response, http://www.honeypots.net/