Conclusion: Dept of CSE, TCE Gadag

You might also like

You are on page 1of 1

CHAPTER 7 CONCLUSION

The advanced techniques and skills of hackers have led to emersion of new security tools and approaches. Honeypots are one of these growing computer security technologies. The main idea behind the honeypots is to use deception to collect data about attacker's activities and procedures. Various deception methods which were discussed contribute in diverting the attacker attention from the real system to consume his time and effort. Several tools have been deployed using different deceptive approaches, some of these tools used combined deception techniques. They have different architecture and methodologies. This study provided a brief summery about each deception approach, and comparison among of them showed their different capabilities, advantages, and drawbacks. Simple honeypots provide simple deception technique; more sophisticated honeypots -which might use various deceptive tools and layers- shown to be more effective. Thus, the defensive deception process is essential and must be oriented in defeating the attacker's intelligence process. Upto date, it is believed the most effective approach to reroute the productive network traffic to honeypots. "Traffic redirection" can be effective technique as it overcomes the narrow view of other techniques where honeypots only able to see the traffic pass through, and as can use along other deception techniques. In the future, this may help us to combine between the various techniques to obtain new and more realistic honeypots.

Dept of CSE, TCE Gadag

Page 19

You might also like