Usually organizations or people lack precise data regarding the attacks that take place on the internet. In most of the cases the organization gets to see the outcomes of various attacks against the computers or networks. After an attack is successful, the computers that have been attacked further attack numerous computers preset within the specific network (Linnane, McLeay and McGarvey 2017). To analyze the way the attacker has carried out the attack is very tough as well as very time consuming process. Along with this, people do not have enough predictions of the attacks against the tools, computer systems, tactics, tools and motives that were involved in the network attacks are usually not known in details. In order to change this particular problem the concept of electronic decoys has been applied to this specific area of IT security.
Honey pot generally refers to the entity that includes various features which make it attractive and attract numerous attackers into that specific vicinity (Kevat 2017). This project proposal discusses regarding the ways by which internal attackers can be caught by the Honey pot method using trap or bait.
According to Saxena, Bachhan and Majumdar, (2015) honey pots are considered as electronic bait that is network resources which are deployed for probing, compromising and attacked. This system runs software that is special in nature and collects information regarding the system along with aiding it in the post incidents network as well as computer forensics. A honey pot is generally a computer system which does not have any conventional task in the network. This particular assumption helps in detecting various incidents. Every interaction with different systems is considered suspicious and might be pointed to a malicious action. These rates are a complete advantage of honey pots which have the chance of getting assembled into various networks of honey pots named honey nets.
As per Sharma (2015) the early used toolsets were coded and then implemented for various purposed. The tools that can be easily used grew along with the growing usage of the internet. After this Fred Cohen had introduced a new set of the toolkit. This specific toolkit was used for publishing numerous fake services which had chances to be attacked by various people intent on the breaking of a system and can be considered as the first example of honey pot sort of implementation which can be used widely. According to Wang, Maharjan and Sun, (2017), honey pot can be defined a wider concept including systems whose sole purpose is to get exploited in a specific way that is different from the terms and services of that particular system. Along with this Tandon and Parimal, (2018) stated that the actual purpose of honey pot is to vereify tools as well s techniques that have been used by hackers and it utilizes this data for analyzing the incursions and then prepares various rules and regulations for Intrusion Detection Systems. This system ensures that same sort of techniques can never be used for getting access to the more strategic information system.
Honey pots differ from the various traditional fortress and passive based approaches for security. These processes implement various security measures like Intrusion Detection and Prevention system, firewalls and many more for keeping attackers away from getting access to various system resources for creating a specific centralized reference validation mechanism along with enough knowledge regarding control on the entity of the system. According to Duncan, Creese and Goldsmith, (2015), there are various advantages of the usage of honey pots within the toolsets of the organization’s security. These advantages include honey pots deter various attacks by the virtue of the implementation, honey pots cause the attackers to concentrate on the exploitation of various non-core systems this allows more time for the honey pots to bloster the posture of security in the production of various systems, honey pots allow researchers to be carried out on the vendors of latest attacks and they have the capability of detecting insider attacks. Honey pots are of various types including shadow honey pots, honey nets, honey farms, honey tokens. Honey pots have numerous interaction levels; these levels include low interaction honey pots, medium interaction honey pots and high interaction honey pots.
Honey pots can be placed in three areas in the organizations. They can be placed internally on an intranet or externally on the internet.
Points to consider during the implementation of a honey pot
Before implementing Honey pot various points should be considered. These points are as follows
Picture 1: Gnat chart
(Source: Created by author)
Usage of honey pot method through bait should definitely provide various benefits to organizations, it helps in catching internal threats of the organization, besides this it also provides various potential ethical or legal issues. These issues are as follows
Risk |
Severity |
Likelihood |
Actions |
Entrapment |
High |
Very low |
The defender must utilize various factors for avoiding the risk of entrapment. |
Privacy |
Very high |
Medium |
Better systems should be used in order to maintain privacy. |
Liability |
Low |
High |
Liability should be provided to employees so that they can contribute to the entire system. |
Conclusion
From the above provided project proposal an initial departure for the security professionals is provided. This proposal discusses the usage of honey pots for finding out the internal attackers in an organization. Usually data can be hacked by two types of hackers, including external hackers and internal hackers, external hackers include cyber criminals and various sources belonging to outside the organization but internal hackers are some factors or sources of the hacks that belong from within the organization. These internal factors are detected through honey pots using trap or bait. This proposal also discusses regarding various advantages of using honey pots and the ways by which they can be used. Usage of honey pots has numerous potential ethical and issues, besides numerous advantages. These implications and issues are mentioned above in details.
References
Castells, M., 2015. Networks of outrage and hope: Social movements in the Internet age. John Wiley & Sons.
Duncan, A., Creese, S. and Goldsmith, M., 2015. An overview of insider attacks in cloud computing. Concurrency and Computation: Practice and Experience, 27(12), pp.2964-2981.
Fagg, J., 2015. Chamber Pots and Gibson Girls: Clutter and Matter in John Sloan’s Graphic Art. American Art, 29(3), pp.28-57.
Fish, A., 2017. Technoliberalism and the end of participatory culture in the United States. Springer.
Han, X., Kheir, N. and Balzarotti, D., 2018. Deception Techniques in Computer Security: A Research Perspective. ACM Computing Surveys (CSUR), 51(4), p.80.
Heckman, K.E., Stech, F.J., Schmoker, B.S. and Thomas, R.K., 2015. Denial and deception in cyber defense. Computer, 48(4), pp.36-44.
Kevat, S.M., 2017. Review on Honeypot Security. International Research Journal of Engineering and Technology (IRJET), 4(06), pp.1200-1203.
Kim, J. and Zakson, D., 2016. Health Information and Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016). The John Marshall Journal of Information Technology & Privacy Law, 32(3), p.1.
Linnane, A., McLeay, L., McGarvey, R. and Jones, A., 2017. Industry-Supported Sampling Underpins Temporal Management Policy Change in a Commercial Rock Lobster (Jasus edwardsii) Fishery. Journal of Shellfish Research, 36(2), pp.511-517.
McGaughy, J.A., Amaral, A.C., Rushmore, R.J., Mokler, D.J., Morgane, P.J., Rosene, D.L. and Galler, J.R., 2014. Prenatal malnutrition leads to deficits in attentional set shifting and decreases metabolic activity in prefrontal subregions that control executive function. Developmental neuroscience, 36(6), pp.532-541.
Poonia, A.S., 2014. Audit Tools for Cyber Crime Investigation. International Journal of Enhanced Research in Science Technology & Engineering, 3(12), pp.16-20.
Saxena, U., Bachhan, O.P. and Majumdar, R., 2015, March. Static and dynamic malware behavioral analysis based on arm based board. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 272-277). IEEE.
Sharma, R., 2015. Review on: Honey Spot for Analysing Network Security and Related Issues. International Journal of Engineering Technology and Computer Research, 3(2).
Tandon, D. and Parimal, P., 2018. A Case Study on Security Recommendations for a Global Organization. Journal of Computer and Communications, 6(03), p.128.
Wang, K., Du, M., Maharjan, S. and Sun, Y., 2017. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Transactions on Smart Grid, 8(5), pp.2474-2482.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download