Features of protecting corporate resources with Honeypot technology

Keywords: Honeypot, IDS, IPS, Intrusion, Informational security, LAN, Firewall

Abstract

The article provides a brief overview of the main features of Honeypot technology. The questions concerning are considered: - features of monitoring network activity at different stages of attack development; - placement of system sensors; - procedures for collecting and summarizing data on network events; - options for modifying protection tools; - organization of the protection structure, etc. The general principles of operation of the respective systems based on individual servers and software-emulated networks are considered. The main disadvantages of this technology are formulated. Attention is drawn to the prospects of using various Honeypot solutions to expand the potential of already deployed information security tools (IS).

Downloads

Download data is not yet available.

Author Biographies

Сабіна Рузудженк, V. N. Karazin Kharkiv National University

Computer science student

Каріна Погоріла, V. N. Karazin Kharkiv National University

Computer science student

Тетяна Кохановська, V. N. Karazin Kharkiv National University

Computer science student

Сергій Малахов, V. N. Karazin Kharkiv National University

Ph.D., Senior Researcher, Associate Professor Departments

References

Сильнов Д. С., Титов К. Е., Разработка и реализация Honeypot-ловушек сетевых служб, использующих протокол SIP, DOI: https://cyberleninka.ru/article/v/razrabotka-i-realizatsiya-honeypot-lovushki-setevyh-sluzhb-ispolzuyuschih-protokol-sip

Безопасная сеть вашей компании / Джон Маллери, Джейсон Занн и др.; пер. с англ. Е. Линдеманн. – М.: НТ Пресс, 2007. – 640 с.

Ріпний О.С., Дьяченко О.О., Малахов С.В. // Особливості функціонування систем IDS та IPS при реалізації спроб несанкціонованого доступу до корпоративних ресурсів. Матеріали IX міжнародній НТК. 11-12.04.2019. – Х.: НТУ "ХПІ". – 2019. – С.95.

Honeypot success stories Ел.ресурс. – URL: https://www.drupal.org/docs/8/modules/honeypot/honeypot-success-stories

Honeypots – University of Arizona Ел.ресурс. – URL: https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic12-final/report.pdf

HoneyPot для спамеров. Персональный блог Игоря Агурьянова Ел.ресурс. – URL: http://aguryanov.blogspot.com/2014/08/honeypot-for-spammer.html

M. M. Rehman H., Honeypots and Routers Collecting Internet Attacks, 2015.

Валерий Коржов Google Public DNS как средство защиты. Ел.ресурс. – URL: https://www.anti-malware.ru/node/2299 (дата звернення 12.12.2019)

Chris Moore, Detecting ransomware with Honeypot techniques. DOI: https://ieeexplore.ieee.org/abstract/document/7600214

Череватенко Д. Р., Торбеева М. В., Honeypot как средство информационной безопасности, DOI: http://ir.nmu.org.ua/bitstream/handle/123456789/1679/19.pdf?sequence=1&isAllowed=y

Lance Spitzner, Honeypots: tracking hackers. Ел.ресурс. – URL: http://www.it-docs.net/ddata/792.pdf

Технология Honeypot, Часть 1: Назначение Honeypot. DOI: https://www.securitylab.ru/analytics/275420.php

Published
2020-01-29
Cited
How to Cite
Рузудженк, С., Погоріла, К., Кохановська, Т., & Малахов, С. (2020). Features of protecting corporate resources with Honeypot technology. Computer Science and Cybersecurity, (4), 22-29. https://doi.org/10.26565/2519-2310-2019-4-03
Section
Статті