EconPapers    
Economics at your fingertips  
 

Assessment of Honeypots: Issues, Challenges and Future Directions

B. B. Gupta and Alisha Gupta
Additional contact information
B. B. Gupta: National Institute of Technology Kurukshtra, India
Alisha Gupta: National Institute of Technology Kurukshtra, India

International Journal of Cloud Applications and Computing (IJCAC), 2018, vol. 8, issue 1, 21-54

Abstract: Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.

Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCAC.2018010102 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcac00:v:8:y:2018:i:1:p:21-54

Access Statistics for this article

International Journal of Cloud Applications and Computing (IJCAC) is currently edited by B. B. Gupta

More articles in International Journal of Cloud Applications and Computing (IJCAC) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jcac00:v:8:y:2018:i:1:p:21-54