ABSTRACT

Static Honeypots systems are the one in which the number and location of Honeypots are fi xed. There can be two ways in which Honeypot can be used as a network security tool-as a detection system and as a deception mechanism. As a detection system, honeypot is deliberately made vulnerable with fake services to lure the attacker towards it. Intruders are expected to compromise the discovered honeypot. The traces left by the intruder are then used by the system administrators to investigate and learn about their tools and techniques in detail. It is used to complement the functionality of a network IDS [1]. The honeypot is coordinated proactively with the fi rewall and the IDS, to achieve early response to network security incidents. As a deception mechanism, Honeypot provides the attacker with what he needs, and infl uence opponent choices in one’s own favor to consume the attacker’s resources in the process.