Home / CIC-COCOS’17 / COCOS'17-Proceedings / A comparative analysis between low and high level HoneyPots

A comparative analysis between low and high level HoneyPots

The concern of information security and data protection is growing and getting more critical day by day within
organizations and companies. This has led developers and researchers to find advanced ways of defense against attacks on networks. One of these ways is using Honeypots. Honeypot is an information security resource used to protect network resources in the way of diverting attackers from their real targets. At the same time, it is used as a tool intended to be attacked and compromised to collect information about attacks that organizations might face and use the collected data to develop methods for protection against these attacks. Honeypots generally come in many forms and shapes, and they are classified according to the level of interaction with attackers. Low interaction Honeypots are easy to maintain and deploy with few risks. High interaction Honeypots are more advanced in terms of maintenance and deployment and more risky but they will gather more extensive and accurate information than low interactive Honeypots. The aim of this paper is to provide a review on Honeypots. It also analyses Honeypots under three (3) main categories: Implementation, effectiveness and limitation in
the security field.
Keywords: Honeypot, Security, low interaction, high interaction,
implementation, performance and limitations

Rebin B. Khoshnaw
College of Science
Salahaddin University Hawler
Erbil, Iraq

DOI: 10.24086/cocos17.03



About admin

Check Also

Factors influencing the adoption of Location Based Identification in Kurdistan Regional of Iraq

Abstract: This study examines the factors that affect the adoption of Location Based Identification LBI ...

Leave a Reply

Your email address will not be published. Required fields are marked *