Honey Pots Over the Last Several Years, Term Paper

Total Length: 666 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Honey Pots

Over the last several years, the issue of security has been increasingly brought to the forefront. This is because more hackers are able to successful breach different security protocols. Recently, honeypots have evolved to protect against these kinds of challenges. This is a system which is set up on the Internet to attract those who are trying to breach other computers or servers. (Spitzner, 2010)

To fully understand how this is utilized requires carefully examining the different types. This will be accomplished by focusing on the various kinds, the benefits of using a virtual machine for implementation and the resources need to set them up. Together, these elements will offer specific insights on the benefits of using honeypots. (Spitzner, 2010)

Research two different honeypots that are available to use free or open source.

The first type of honeypot is Honeyd. This is an open source application which is easy to deploy and can be uploaded mainly to a Linux-based operating systems. It is focused on monitoring the unused IP addresses of an organization.

Stuck Writing Your "Honey Pots Over the Last Several Years," Term Paper?

This is because hackers will search for any kind of backdoor solution to gain access to the database. One way they are able to do this is through scanning all of the IP addresses that are available. When a Honeyd detects this, it isolates the threat and alerts the webmaster that an attack is in progress. This limits the ability of hackers to breach these vulnerabilities and mitigate any kind of threats early. In this case, Symantec was selected utilizing a pure honeypot. (Spitzner, 2010) (Whitman, 2009)

The second kind is a Bubblegum Proxy Pot. This is an open source solution which is designed to deceive and detect spammers by providing them with a list of IP addresses for them to go through utilizing http connects. The basic idea is to slowdown their ability to access the site and obtain information about vulnerable areas. This is a low interaction honeypot and it was selected from Digiater. ("Overview," 2011)….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Honey Pots Over The Last Several Years " (2013, August 25) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/honey-pots-last-several-years-95161

Latest MLA Format (8th edition)

Copy Reference
"Honey Pots Over The Last Several Years " 25 August 2013. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/honey-pots-last-several-years-95161>

Latest Chicago Format (16th edition)

Copy Reference
"Honey Pots Over The Last Several Years ", 25 August 2013, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/honey-pots-last-several-years-95161