EXPLORING THE FUNCTIONALITIES OF HONEYPOT TECHNOLOGY

Authors

  • Dilshoda Qurbonaliyeva TUIT
  • Zarif Xudaykulov
  • Suhrobjon Bozorov

Keywords:

Honeypot server, honeypot classification, virtual honeypot, physical honeypot, honeynet, attack, hacker activities, vulnerability, monitoring, DMZ.

Abstract

A honeypot is a computer system or application created as a trap to attract malicious attackers attempting to attack computer networks through false vulnerabilities. When a hacker falls into this trap, the honeypot system provides administrators with valuable information about the attacker, the actions being performed, and, in many cases, helps to identify the attacker. This article presents an analysis of the functional capabilities and algorithms of Honeypot tools. Based on the obtained results, a comparative analysis of auxiliary programs capable of detecting the actions of attackers on the network and protecting the real system from attacks is provided.

References

Дилшода Курбаналиева, 2023. “Tarmoq xujumlarini aniqlash vositalari tahlili”. Ж: Информатика и инженерные технологии.

A. Javadpour, F. Ja’Fari, T. Taleb and C. Benzaïd, "A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques," 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS), Toulouse, France, 2023, pp. 81-88, doi: 10.1109/ICECCS59891.2023.00019

Pawlick, J., Colbert, E., Zhu, Q., 2018. Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans. Inf. Forensics Secur. 14 (7), 1871–1886.

Shanto Roy, Nazia Sharmin, Mohammad Sujan Miah, Jaime C Acosta, Christopher Kiekintveld, And Aron Laszka. Adversarial Reconnaissance Mitigation and Modeling. arXiv:2306.06769v1 [cs.CR].

Lance Spitzner (2002). Honeypots tracking hackers. Addison-Wesley. pp. 68–70. ISBN 0-321-10895-7.

Katakoglu, Onur (2017-04-03). "Attacks Landscape in the Dark Side of the Web" (PDF). acm.org. Retrieved 2017-08-09.

Suhrobjon Bozorov, Nozima Akhmedova, Dilshoda Qurbonaliyeva and Kader Gultekin 2024. “Survey on honeypot: detection, countermeasures and future with ML”, AIP Conference Proceedings (ISSN:0094-243X; E-ISSN:1551-7616).

Published

2024-10-20

How to Cite

Qurbonaliyeva, D., Xudaykulov, Z., & Bozorov, S. (2024). EXPLORING THE FUNCTIONALITIES OF HONEYPOT TECHNOLOGY. The Descendants of Al-Fargani, 1(3), 174–180. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/502