Publication detail

Current State of Honeypots and Deception Strategies in Cybersecurity

ZOBAL, L. KOLÁŘ, D. FUJDIAK, R.

Original Title

Current State of Honeypots and Deception Strategies in Cybersecurity

English Title

Current State of Honeypots and Deception Strategies in Cybersecurity

Type

conference paper

Language

en

Original Abstract

This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize its advantages and disadvantages, as well as legal and ethical issues. We classify honeypots to different categories and present examples of both actively developed honeypots and ones that had a significant impact. Finally, we discuss the current challenges in this field.

English abstract

This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize its advantages and disadvantages, as well as legal and ethical issues. We classify honeypots to different categories and present examples of both actively developed honeypots and ones that had a significant impact. Finally, we discuss the current challenges in this field.

Keywords

honeypot;honeynet;deception;cybersecurity;threat intelligence

Released

30.10.2019

Location

Ireland, Dublin

ISBN

978-1-7281-5763-4

Book

2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

Pages from

1

Pages to

9

Pages count

9

BibTex


@inproceedings{BUT159921,
  author="Lukáš {Zobal} and Dušan {Kolář} and Radek {Fujdiak}",
  title="Current State of Honeypots and Deception Strategies in Cybersecurity",
  annote="This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize its advantages and disadvantages, as well as legal and ethical issues. We classify honeypots to different categories and present examples of both actively developed honeypots and ones that had a significant impact. Finally, we discuss the current challenges in this field.",
  booktitle="2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)",
  chapter="159921",
  doi="10.1109/ICUMT48472.2019.8970921",
  howpublished="online",
  year="2019",
  month="october",
  pages="1--9",
  type="conference paper"
}