Use of Honeypots to Increase Awareness Regarding Network Security
Bhumika1, Vivek Sharma2

1Bhumika, Department of CSE, Kurukshetra University, India.
2Vivek Sharma, Department of CSE, Kurukshetra University, India.

Manuscript received on 18 June 2012 | Revised Manuscript received on 25 June 2012 | Manuscript published on 30 June 2012 | PP: 171-175 | Volume-1 Issue-2, June 2012 | Retrieval Number: B0232051212/2012©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Honeypots are a relatively new technique for achieving network security. While other techniques for securing networks e.g. IDS, Firewall etc are made to keep the attackers out, for the first time in the history of network security there is a technique which intends to keep the attackers ‘in’ thus allowing the researchers to gain more insight into the workings of an attacker. With the rapid development of Internet and the advent of the network socialization, network security has been more concerned in the technologies. Among the main network security technologies are firewall, intrusion detection techniques, access control, etc., which are based on the known facts and attack mode and adopt passive defensive approach. The current commonly-used intrusion detection technology of passive defense, based on model matching, needs to update the intrusion detection rule library, otherwise omission of the latest attack will occur in the process. To eliminate the shortcomings of detection system being unable to update feature library, the users should adopt a proactive defense honeypot technology to automatically update its att ack signature to reduce the miss probability of int rusion detection system. Honeypot is a newly-developing area of network security. It lures the intruder to attack it by constructing a system with security vulnerability and then record the intrusion methods, motives, and tools of the intruder in the intruding process. By analyzing the intrusion information, we can get the content of the newest techniques of the intruder and find the system vulnerability. And the virtual honeypot can prevent the host computer from attacking.
Keywords: Honeypots, Honeyd, Honeynets, IDS, Network Securit.y

Scope of the Article: Network Security