Open Access Open Access  Restricted Access Subscription or Fee Access

Role of a Honeypot in Network Security – Survey

N. Harismita


The tactics used to attack networks is increasing as the objectives of securing a network is also enormously progressing. Thus it is important to find ways to combat the threats; such a method will deeply wound over honeypots. A honeypot is a new concept that focuses on diverting hackers, malicious traffic; get a prior warning about the attack and information about the attacker and attacking methods. A honeypot is a great way to analyze, perceive, monitor and track the behavior of hacker to create more secure systems. Compared to an IDS or firewall, honeypots is an advanced technology because they do not create counterfeit alerts as each observer is suspicious of the traffic due to no productive components running on the system.

In this paper, a detailed description about honeypots, their types, advantages, and how honeypot technologies can be used to analyze and gather information on these threats is discussed.


Honeypots, Hacking, Forensic, Interaction, Research, Security, Types of Honeypots.

Full Text:



Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley.

Roger, Honeypots for Window A Grimes - United States-NewYork [Apress], 2005

Akkaya, D., & Thalgott, F. (2010). Honeypots in network security (Dissertation). Retrieved from

Spitzner, Lance. “The Value of Honeypots.” 10 January 2003

Shaw, Eric D. Ruby, Keven G and Post, Jerrold M. “The Insider Threat To Information Systems.” September 1998. URL: htm. (Last Accessed 23 Oct. 2003).

Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23-24, 2007, Winston-Salem, North Carolina, USA, pp.321-325.

Joshi, R. C., and Anjali Sardana. Honeypots: a new paradigm to information security. CRC Press, 2011.

Wicherski, Georg. "Medium interaction honeypots." German Honeynet Project (2006).

W. Ren and H. Jin, “Honeynet based distributed adaptive network forensics and active real time investigation,” in Proceedings of the 2005 ACM symposium on Applied computing, Saanta Fe, New Mexico, 2005, pp. 302–303.

Baumann, Reto and Plattner, Christian. “White Paper: Honeypots.” Mar 2002. URL: (Last Accessed 23 Oct. 2003).

Spitzner, Lance. “Honeypots: Are They Illegal?” 12 June 2003. URL: (Last Accessed 23 October 2003).

Spitzner, Lance. "Honeytokens: The other honeypot." (2003).

Fabien Pouget, Marc Dacier, and Van Hau Pham. Understanding threats: a prerequisite to enhance survivability of computing systems. In Proceedings of IISW'04, International Infrastructure Survivability Workshop 2004, in conjunction with the 25th IEEE International RealTime Systems Symposium (RTSS 04) December 5-8, 2004 Lisbonne, Portugal, Dec 2004.

Alata, Eric, and Luigi Nardi. "Modelling attack processes on the Internet, based on honeypot collected data."


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.