Honey Spot

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Abstract:

Introduction/motivation:

Motivation of this paper stems from the research paper “Honeyspot: The wireless honeypot”
based on the Spanish Honeynet Project. Internet is full of excellent resources that describe
wireless technologies, threats and offerings and also honeypot technologies. We all know that
when wireless networks exist, there ought to have wireless security issues. Honeypots are
security resources to mitigate this threat. Honeyspot accurately summarizes the concept around
Wireless Honeypot. Hence, the definition is as follows:

“A HoneySpot is a venue that offers Wi-Fi access whose value is being probed, attacked, or
compromised; you want the bad guys to interact with it”

Problem statement:

Since the time Honeypot was developed, it was used extensively to monitor the attacker’s
activities in different IT environments. But it was not used as much for wireless technologies.

Plan:

Due to the boundless usage of wireless tools and technologies today, it is required to get an
absolute knowledge about the real economics of exploitation currently used to compromise
wireless networks. Trying to bridge this knowledge gap, the main target of this paper is to
observe the state of real life wireless hacking, and introduce and promote the design and
deployment of wireless honeypots.

You might also like