Honeypots and Intrusion Detection Systems Research Paper by ABCs

Honeypots and Intrusion Detection Systems
This paper attempts to identify ways a website honeypot can act as an intrusion detection system for organizations' computer systems.
# 113185 | 2,478 words | 8 sources | APA | 2009 | US

$49.95 Buy and instantly download this paper now


The paper attempts to identify ways in which a website Honeypot can be used as a detection measure or system and to determine its ability to achieve these goals in ways that are superior to other types of intrusion detection systems. The paper provides an overview of intrusion detection systems (IDS), the two primary classifications of honeypots and their respective intended applications and the different types of honeypots. The paper then provides a general discussion concerning the legal issues that affect the use of honeypots that should be taken into account before an organization makes the decision to use this intrusion detection system approach.

Chapter 1: Introduction
Chapter 2: Intrusion Detection Systems
Chapter 3: Classification and Types of Honeypots
Chapter 4: Legal Issues Affecting the Use of Honeypots

From the Paper:

"By any measure, the Internet has changed the way both consumers and businesses of all types interact and pursue their respective goals. Indeed, the Internet has transformed the way in which people go about the daily lives in some profound ways, but there are some significant problems involved. For example, Elifoglu (2002) points out, "The open nature of the Internet makes security a real challenge for today's companies" (p. 67). Such security issues have assumed even greater importance in recent years as more and more companies establish a Web presence to facilitate their organizational goals."

Sample of Sources Used:

  • Andress, A. (2003). Surviving security: How to integrate people, process, and technology. Boca Raton, FL: Auerbach Publications.
  • Elifoglu, I. H. (2002). Navigating the 'information super highway': How accountants can help clients assess and control the risks of Internet-based e-commerce. Review of Business, 23(1), 67-69.
  • Grimes, R. A. (2008). Honeypots, honeynets. Honeypots.net. [Online]. Available: http://www. honeypots.net/.
  • Hinojosa, P. (2005). Information security: Where we've been and where we need to go. T H E Journal, 32(7), 36.
  • Provos, N. (2008). Honeypot background. [Online]. Available: http://www.honeyd.org/ background.php.

Cite this Research Paper:

APA Format

Honeypots and Intrusion Detection Systems (2009, March 22) Retrieved December 20, 2014, from http://www.academon.com/research-paper/honeypots-and-intrusion-detection-systems-113185/

MLA Format

"Honeypots and Intrusion Detection Systems" 22 March 2009. Web. 20 December. 2014. <http://www.academon.com/research-paper/honeypots-and-intrusion-detection-systems-113185/>