Using traps to protect network infrastructure from intruders’ attacks
DOI:
https://doi.org/10.20535/RADAP.2013.55.128-134Keywords:
Honeypot trap, network infrastructure, means of information protection, information attacks, information threatsAbstract
The article deals with the peculiarities of using traps to protect network infrastructure from intruders’ attacks, which concern the risks of unauthorized intrusion to a network: attacks on a network, its unauthorized research, etc. It has been clarified that Honeypot trap is flexible information technology, which can be applied to prevent attacks, their detection and answer to them. As a means of protection Honeypot-traps have ability to work effectively in the infrastructure network, while collecting small amount of data, however they are of considerable importance for the owners of network.References
Література
Гайворонський М.В. Безпека інформаційно-комунікаційних систем / М.В. Грай-воронський, О.М. Новіков. – К. : Вид. група BHV, 2009. – 608 c.
Закон України "Про захист інформації в інформаційно-телекомунікаційних сис-темах" від 05.07.1994 р., № 80/94, редакція від 30.04.2009 р. [Електронний ресурс]. – Режим доступа: http://zakon4.rada.gov.ua/laws/show/80/94-вр
Михеев Д. Приманка для мух: технологии Honeypot / Д. Михеев. [Электронный ресурс]. – Режим доступа: http://www.itsec.ru/articles2/Oborandteh/priman ka_dlya_muh
Обнаружение и противодействие honeypots: системные вопросы [Электронный ресурс]. – Режим доступа: http://www.nestor.minsk.by/sr/2005/05/sr50516.html
Патий Е. Honeypot: приманка для злоумышленника / Е. Патий. [Электронный ре-сурс]. – Доступный с http://citcity.ru/15560/
Хакеры взломали iPhone за 20 секунд [Электронный ресурс]. – Режим доступа: http://www.segodnya.ua/science/khakery-vzlomali-iphone-za-20-cekund.html
Хто такі хакeри і що вони собою представляють [Електронний ресурс]. – Режим доступа: http://http://hakyr.blog.net.ua/
Honeypot – приманка для нарушителя [Электронный ресурс]. – Режим доступа: http://cybern.ru/honeypot.html
References
Haivoronskyi M.V., Novikov O.M. (2009) Bezpeka informatsiino-komunikatsiinykh system [Security Information and Communication Systems]. Kyiv, BHV Publ., 608 p.
Zakon Ukrainy “Pro zakhyst informatsii v informatsiino-telekomunikatsiinykh syste-makh” [The Law of Ukraine “Data Protection in the information and telecommunication sys-tems”]. Available at: http://zakon4.rada.gov.ua/laws/show/80/94-вр (Accessed 01 Dec 2013)
Mikheyev D. Bait for the flies: Honeypot technology. Available at: http://www.itsec.ru/articles2/Oborandteh/priman ka_dlya_muh (Accessed 01 Dec 2013)
Detection and counteraction honeypots: System Aspect. Available at: http://www.nestor.minsk.by/sr/2005/05/sr50516.html (Accessed 01 Dec 2013)
Patyi E. Honeypot: bait for attackers. Available at: http://citcity.ru/15560/ (Accessed 01 Dec 2013)
IPhone hackers broke into the 20 seconds. Available at: http://www.segodnya.ua /science/khakery-vzlomali-iphone-za-20-cekund.html (Accessed 01 Dec 2013)
Who are hackers and what they represent. Available at: http://http://hakyr.blog.net.ua/ (Accessed 01 Dec 2013)
Honeypot - bait for the intruder. Available at: http://cybern.ru/honeypot.html (Ac-cessed 01 Dec 2013)
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).