By Topic

Client honeypots: Approaches and challenges

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Qassrawi, M.T. ; Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China ; Hongli Zhang

In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest link in the security chain. Traditional honeypots and security tools are not effective against these new attacks. Therefore, client honeypot has appeared as new technology to supplement the existing protection tools. Client honeypot is a honeypot actively searches for malicious sites on the web. In this paper, we will show and analyze the main approaches used by client honeypots to detect client-side attacks. We will also address how attacker can evade and hide from client honeypots. Moreover, we discuss and analyze various issues relates to client honeypot: detection problems, invisibility of honeypots, and integrity issues. By analyzing characteristics of client honeypots, we will introduce factors to define and measure client honeypots effectiveness.

Published in:

New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on

Date of Conference:

11-13 May 2010