1st Edition

Honeypots A New Paradigm to Information Security

Edited By C. P. Joshi, Anjali Sardana Copyright 2011

    A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

    Honeypots
    Background
    Honeypots
    Honeypots vs. Firewalls and Intrusion
    Classification of Honeypots
    Placement of Honeypots
    Varieties of Honeypots: Honey tokens, Honeypages, Honeynets and Honeyfarms
    Value of Honeypots
    Risks and Tradeoffs
    Key Issues and Challenges

    Commercially Available Honeypots
    Backofficer Friendly
    Specter
    Mantrap
    Honeyd

    Honeynets
    Overview of Honeynets
    Value of Honeynets
    Working of Honeynet
    Honeynet Architectures
    Sweetening the Honeynets
    Risks Associated with Honeynets

    Attacks and Role of Honeypots
    Phases of Attack and Honeypots
    Worms and Virus Attacks
    Spam and Phishing Mails
    Distributed Denial of Service Attacks

    Static Honeypots
    Honeypot as Detection Systems
    Honeypot as Deception Systems

    Virtual Honeypots
    Virtual Honeypot: VMware Workstation
    Data Capture on Virtual Honeypots
    Raw Disks and Virtual Disks
    Virtual Honeynet
    Case Study

    Dynamic Honeypots
    Issues with Static Honeypots
    Dynamic Honeypots
    Dynamic Honeypot Design
    Dynamic Honeypot
    Construction
    Benefits

    Wireless Honeypots
    Introduction to Wireless Local Area Networks
    Basic Wireless Concepts
    Security
    Wireless Attacks: From A
    Blackhat’s perspective
    Wireless Honeypots
    Limitations

    Applications of Honeypot
    Defense against automated attacks
    Protection against human intruders
    Surgical Detection Methods
    Cyber-Forensics
    Network Surveillance
    Forensic Analysis
    Tactical Battlefield
    Use as Deterrent
    Research
    Purpose

    Anti Honeypot Technology
    Network Issues
    System Issues
    Techniques for Honeypot Detection
    Counter-measure for Detection of
    Honeypot Deployment

    Honeypots and Network Forensics
    Network Forensics
    Honeypot as Network Forensic Analysis Tools
    Honeypot Based Network Forensics
    Frameworks

    Biography

    Joshi, R. C.; Sardana, Anjali