Pitcherpot: Avoiding Honeypot Detection

  • Vinod K. Panchal
  • Pramod K. Bhatnagar
  • Mitul Bhatnagar
Part of the Communications in Computer and Information Science book series (CCIS, volume 40)


This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker.


Pitcherpots Honeypots Honeypot firewalls TCP/IP protocol Black Hat community 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Spitzner, L.: Honeypots: tracking attackers. Addison-Wesley, Boston (2002)Google Scholar
  2. 2.
    Simon, I.: Honeypots: How do you know when you are inside one? SCISSEC & Edith Cowan University (2006)Google Scholar
  3. 3.
    Krawetz, N.: Anti Honeypot Technology. IEEE Security and Privacy (2004)Google Scholar
  4. 4.
    Shiue, L.-M.: Counter measures for detection of Honeypot Deployment ICCCE (2008)Google Scholar
  5. 5.
    Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 7th edn. John Wiley & Sons, Chichester (2005)Google Scholar
  6. 6.
  7. 7.
    Honeypot Intrusion Detection, Incident Response,

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Vinod K. Panchal
    • 1
  • Pramod K. Bhatnagar
    • 2
  • Mitul Bhatnagar
    • 3
  1. 1.Defence Terrain Research LabMetcalfe HouseDelhiIndia
  2. 2.Institute for system studies and analysesMetcalfe HouseDelhiIndia
  3. 3.Swami Keshwanand Institute of technologyUniversity of RajasthanIndia

Personalised recommendations