Main Article Content

Salimova Husniya Rustamovna


Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

Article Details

How to Cite
Salimova Husniya Rustamovna. (2022). HONEYPOTS IN NETWORK SECURITY. Galaxy International Interdisciplinary Research Journal, 10(5), 914–918. Retrieved from https://internationaljournals.co.in/index.php/giirj/article/view/1972


William Stallings “Cryptography and Network Security Principles and Practices” Prentice Hall Publication, pp. 581, 2005.

Lance Spitnzer “Honeypots: Tracking Hackers” Addison Wisley Longman Publishing Co.in, 2002.

Liu Dongxia, Zhang Yongbo, “An Intrusion Detection System Based on Honeypot Technology” , In the Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE2012), Hangzhou, pp. 451-454.

Tao, Jing. Immune-based intrusion prevention model [J]. Network and Information, 200907

Peng Hong, Wang Cong, Guan Xin “Intrusion Prevention System in the Network of Digital Mine” 2nd International Conference on Computer Engineering and Technology, Volume 6, pp. 296-299, 2010.

M. Sqalli, R. AlShaikh, E. Ahmed “Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study” UKSim Fourth European Modeling Symposium on Computer Modelling and Simulation.pp. 316-321, 2010

Ariel Bar, Bracha Shapira, Lior Rokach and Moshe Unger, “Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis” IEEE International Conference on Software Science, Technology and Engineering , pp. 28-36, 2016.

Thesis on “Honeypots in Network Security” by Deniz Akkaya-Fabien Thalgott, School of Computer Science, Physics and Mathematics, Linnaeus University, 29th June 2010.

Gérard Wagener. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour” Computer Science [cs]. Institut National Polytechnique de Lorraine - INPL, 2011. English.

Jules Pagna Disso, Kevin Jones, Steven Bailey, “A Plausible Solution SCADA Security: Honeypot Systems” Eighth International Conference on Broadband, Wireless Computing, Communication and Applications,pp. 443-448, 2013.

Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, Khaled Salah, “Identifying Scanning Activities in Honeynet Data using Data Mining” Third International Conference on Computational Intelligence, Communication Systems and Networks, pp. 178-183, 2011.

A. Mairh, et al., Honeypot in network security: a survey, In: Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, 2011. p. 600-605.

L. Spitzner, Honeypots: Catching the insider threat, In: Computer Security Applications Conference 2003, Proceedings. 19th Annual. IEEE, 2003. p. 170-179, 2003

Dissertation on “Deception Techniques Using Honeypots” by Amit D. Lakhani, Information Security Group Royal Holloway, University of London, UK.

Keith Harrison, James R. Rutherford, and Gregory B. White “The Honey Community: Use of Combined Organizational Data for Community Protection” 48th Hawaii International Conference on System Sciences, pp. 2288-2297, 2015.