How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey
Paul Lackner
2021
Abstract
In a digitized world even critical infrastructure relies on computers controlled via networks. Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a step ahead of defenders. Honey systems (honeypots, honeynets, honeywalls, and honeytoken) seek to counterbalance this situation. Honey systems trap attackers by generating phoney services, nets, or data, thereby preventing them from doing damage to production systems and enable defenders to study attackers without letting intruders initially notice. This paper provides an overview of existing technologies, their use cases, and pitfalls to bear in mind by illustrating various examples. Furthermore, it shows the recent efforts made in the field and examines the challenges that still need to be solved.
DownloadPaper Citation
in Harvard Style
Lackner P. (2021). How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. In Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-509-8, pages 181-188. DOI: 10.5220/0010400001810188
in Bibtex Style
@conference{iceis21,
author={Paul Lackner},
title={How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey},
booktitle={Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2021},
pages={181-188},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010400001810188},
isbn={978-989-758-509-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey
SN - 978-989-758-509-8
AU - Lackner P.
PY - 2021
SP - 181
EP - 188
DO - 10.5220/0010400001810188