Dynamic Honeypots

Authors

  • Selby Dasent Te Herenga Waka—Victoria University of Wellington

Keywords:

Cybersecurity, Dynamic honeypots

Abstract

Traditional honeypots have long served as valuable tools for monitoring and studying attacks on both research and production networks. However, their inherent static nature falls short in accurately reflecting the dynamic landscape of today’s networks. Modern networks comprise of changing hosts and devices that frequently connect and disconnect, making honeypot's single-host, open-port setup with its static address conspicuous amidst the network activity. To address this static nature, dynamic honeypots automatically deploy and configure hosts, enabling them to blend harmoniously with the network's existing environment. This paper introduces a dynamic honeypot design that automates the configuration and deployment of Cowrie honeypots within a network environment. Importantly, this system boasts the ability to be deployed without prior knowledge of the network's topology or associated hosts.

Downloads

Download data is not yet available.

Downloads

Published

2023-10-10

How to Cite

Dasent, S. (2023). Dynamic Honeypots. Wellington Faculty of Engineering Symposium. Retrieved from https://ojs.victoria.ac.nz/wfes/article/view/8364

Issue

Section

Cybersecurity Engineering