Deception in Dynamic Web Application Honeypots: Case of Glastopf
Journal article
Authors/Editors
Research Areas
Publication Details
Subtitle: Deception in Dynamic Web Application Honeypots: Case of Glastopf
Publisher: Elsevier
Publication year: 2017
Volume number: 6
Issue number: 4
Start page: 179
End page: 185
Number of pages: 7
ISSN: 2212-6090
URL: http://worldcomp-proceedings.com/proc/p2015/SAM9766.pdf
Abstract
Websites contain critical information to both the organization and the customers. With the cyber security threats currently on the rise, websites are getting easily compromised which prompts administrators to find ways to secure them from the black hat community. The use of honey pots as an alternative to other methods of securing web sites had brought with it advantages as well as disadvantages. Glastopf as one of the web application honeypots brings with it features that emulates a real server. It replies to the attack using the response that the attacker is expecting from his attempt to exploit the real server. However, Glastopf has its disadvantages too. Once deployed, Glastopf can be easily identified by the attackers due to the simplicity and static nature of its web-page templates. This paper seeks to improve the camouflage nature of the honeypot by proposing a new frame work which will produce dynamic web pages that will completely disguise the fake pages from the user
Keywords
honeypot security, deception, dynamic web pages,cyber attack
Documents
No matching items found.