Deception in Dynamic Web Application Honeypots: Case of Glastopf

Journal article


Authors/Editors


Research Areas


Publication Details

Subtitle: Deception in Dynamic Web Application Honeypots: Case of Glastopf

Publisher: Elsevier

Publication year: 2017

Volume number: 6

Issue number: 4

Start page: 179

End page: 185

Number of pages: 7

ISSN: 2212-6090

URL: http://worldcomp-proceedings.com/proc/p2015/SAM9766.pdf


View on publisher site


Abstract

Websites contain critical information to both the

organization and the customers. With the cyber security

threats currently on the rise, websites are getting easily

compromised which prompts administrators to find ways to

secure them from the black hat community. The use of honey

pots as an alternative to other methods of securing web sites

had brought with it advantages as well as disadvantages.

Glastopf as one of the web application honeypots brings

with it features that emulates a real server. It replies to

the attack using the response that the attacker is expecting

from his attempt to exploit the real server. However, Glastopf

has its disadvantages too. Once deployed, Glastopf can be

easily identified by the attackers due to the simplicity and

static nature of its web-page templates. This paper seeks to

improve the camouflage nature of the honeypot by proposing

a new frame work which will produce dynamic web pages

that will completely disguise the fake pages from the user


Keywords

honeypot security, deception, dynamic web pages,cyber attack


Documents

No matching items found.


Last updated on 2019-22-07 at 09:13