How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey

Paul Lackner

Abstract

In a digitized world even critical infrastructure relies on computers controlled via networks. Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a step ahead of defenders. Honey systems (honeypots, honeynets, honeywalls, and honeytoken) seek to counterbalance this situation. Honey systems trap attackers by generating phoney services, nets, or data, thereby preventing them from doing damage to production systems and enable defenders to study attackers without letting intruders initially notice. This paper provides an overview of existing technologies, their use cases, and pitfalls to bear in mind by illustrating various examples. Furthermore, it shows the recent efforts made in the field and examines the challenges that still need to be solved.

Download


Paper Citation


in Harvard Style

Lackner P. (2021). How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. In Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-509-8, pages 181-188. DOI: 10.5220/0010400001810188


in Bibtex Style

@conference{iceis21,
author={Paul Lackner},
title={How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey},
booktitle={Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2021},
pages={181-188},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010400001810188},
isbn={978-989-758-509-8},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 23rd International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey
SN - 978-989-758-509-8
AU - Lackner P.
PY - 2021
SP - 181
EP - 188
DO - 10.5220/0010400001810188