{"title":"Efficacy Measuring Framework for the Assessment of Dynamic Honeypot","authors":"Vaishali Shirsath, M. Chandane","doi":"10.1109/icac353642.2021.9697296","DOIUrl":null,"url":null,"abstract":"Honeypots are the form of decoys deployed in the network to capture malicious and unauthorized activities, they are also used to observe adversary behavior, tools, and strategies in a variety of ways. However, the effectiveness of the honeypot is only determined when it is breached by the intruder. Unfortunately, implementing and maintaining honeypots is difficult and it is also hard to measure the efficacy that compounds the problems after implementation. There is a need for some processes to determine if honeypot is efficient while it is kept active round-the-clock. This is an active issue since an ineffective honeypot could result in poor efficiency, misrepresentation, or even premature detection by an attacker. As a result, a detailed and in-depth analysis framework for honeypot efficacy has been proposed in this paper, which has hitherto not appeared in much literature, and reveals several important limitations of active honeypot for the organization when it is not required. The objective is to determine the decision matrix to assess honeypot's ability to fingerprint, obtain valid adversary data, deceive intruders, and smartly monitor the network environment at an optimum cost.","PeriodicalId":196238,"journal":{"name":"2021 International Conference on Advances in Computing, Communication, and Control (ICAC3)","volume":"22 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advances in Computing, Communication, and Control (ICAC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icac353642.2021.9697296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Honeypots are the form of decoys deployed in the network to capture malicious and unauthorized activities, they are also used to observe adversary behavior, tools, and strategies in a variety of ways. However, the effectiveness of the honeypot is only determined when it is breached by the intruder. Unfortunately, implementing and maintaining honeypots is difficult and it is also hard to measure the efficacy that compounds the problems after implementation. There is a need for some processes to determine if honeypot is efficient while it is kept active round-the-clock. This is an active issue since an ineffective honeypot could result in poor efficiency, misrepresentation, or even premature detection by an attacker. As a result, a detailed and in-depth analysis framework for honeypot efficacy has been proposed in this paper, which has hitherto not appeared in much literature, and reveals several important limitations of active honeypot for the organization when it is not required. The objective is to determine the decision matrix to assess honeypot's ability to fingerprint, obtain valid adversary data, deceive intruders, and smartly monitor the network environment at an optimum cost.