Visible to the public Honey Pots 2015Conflict Detection Enabled

SoS Newsletter- Advanced Book Block


SoS Logo

Honey Pots


Honeypots are traps set up to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. This short bibliography cites articles presented in 2015 about honeypot and honeynet research. They are related to the Science of Security topics of privacy, human factors, and governance.

Sadasivam, G.K.; Hota, C., “Scalable Honeypot Architecture for Identifying Malicious Network Activities,” in Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on, vol., no., pp. 27–31, 20–21 Feb. 2015. doi:10.1109/EITES.2015.15
Abstract: Server honey pots are computer systems that hide in a network capturing attack packets. As the name goes, server honey pots are installed in server machines running a set of services. Enterprises and government organisations deploy these honey pots to know the extent of attacks on their network. Since, most of the recent attacks are advanced persistent attacks there is much research work going on in building better peripheral security measures. In this paper, the authors have deployed several honey pots in a virtualized environment to gather traces of malicious activities. The network infrastructure is resilient and provides much information about hacker’s activities. It is cost-effective and can be easily deployed in any organisation without specialized hardware.
Keywords: computer crime; computer network security; file servers; virtualisation; advanced persistent attacks; attack packets; government organisations; hacker activities; malicious network activities identification; peripheral security measures; scalable honeypot architecture; server honeypots; server machines; virtualized environment; Computer architecture; Computer hacking; IP networks; Malware; Operating systems; Ports (Computers); Servers; Dionaea; Distributed honeypots; Glastopf; HoneyD; Honeypots; J-Honeypot; Kippo; Server honeypots (ID#: 15-7516)


Sokol, Pavol; Husak, Martin; Lipták, Frantisek, “Deploying Honeypots and Honeynets: Issue of Privacy,” in Availability, Reliability and Security (ARES), 2015 10th International Conference on, vol., no., pp. 397–403, 24–27 Aug. 2015. doi:10.1109/ARES.2015.91
Abstract: Honey pots and honey nets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered together. In this paper, we outline privacy issues of honey pots and honey nets with respect to technical aspects. The paper discusses the legal framework of privacy, legal ground to data processing, and data collection. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues. This paper is one of the first papers which discuss in detail privacy issues of honey pots and honey nets in accordance with EU law.
Keywords: EU law; data retention; honeynet; honeypot; legal issues; privacy (ID#: 15-7517)


Harrison, K.; Rutherford, J.R.; White, G.B., “The Honey Community: Use of Combined Organizational Data for Community Protection,” in System Sciences (HICSS), 2015 48th Hawaii International Conference on, vol., no., pp. 2288–2297, 5–8 Jan. 2015. doi:10.1109/HICSS.2015.274
Abstract: The United States has US CYBERCOM to protect the US Military Infrastructure and DHS to protect the nation’s critical cyber infrastructure. These organizations deal with wide ranging issues at a national level. This leaves local and state governments to largely fend for themselves in the cyber frontier. This paper will focus on how to determine the threat to a community and what indications and warnings can lead us to suspect an attack is underway. To try and help answer these questions we utilized the concepts of Honey pots and Honey nets and extended them to a multi-organization concept within a geographic boundary to form a Honey Community. The initial phase of the research done in support of this paper was to create a fictitious community with various components to entice would-be attackers and determine if the use of multiple sectors in a community would aid in the determination of an attack.
Keywords: critical infrastructures; organizational aspects; security of data; DHS; US CYBERCOM; US military infrastructure; United States; combined organizational data; community protection; critical cyber infrastructure; cyber frontier; fictitious community; geographic boundary; honey community; honeynets; honeypots; multiorganization concept; would-be attackers; Cities and towns; Communities; Government; Monitoring; Ports (Computers); Security; Cyberdefense; Honey Community; Honey Net; Honey Pot (ID#: 15-7518)


Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.