Website Honeypots Research Proposal by ABCs

Website Honeypots
An introduction to a proposed study on how a Website honeypot can act as an intrusion detection system (IDS).
# 113115 | 2,059 words | 10 sources | APA | 2009 | US

$19.95 Buy and instantly download this paper now


The paper proposes a study that seeks to identify ways in which a Website honeypot can help security professionals perform their jobs more effectively by acting as an intrusion detection system (IDS). The paper consists of the introductory chapter that provides an overview and brief description of honeypots and how they can be used to identify potential vulnerabilities in a Website. The paper also reviews the four steps that will be followed to achieve the proposed study's research goal.

Chapter One: Introduction
Honeypot Overview and Purpose
Chapter Summary

From the Paper:

"The origins of intrusion detection systems are lost in the mists of time, but it is clear from the archaeological record that people have been trying to protect what is theirs from early on by using an increasingly sophisticated array of barricades, fortifications and other barriers designed to keep the "bad guys" out. The historic record also provides ample evidence of how the "bad guys" would always develop ways to overcome these defenses, and the same cycle continues in the defense industry and home protection market today. Moreover, these same security needs have been extended to digital data of all types in the Age of Information, but especially data that is maintained on computer systems that are connected to the Internet."

Sample of Sources Used:

  • Baker, R. (1998, July 20). Jesse Helms's honeypot. The Nation, 267(3), 22.
  • Carpenter, H. & Prichard, M. (1999). The Oxford companion to children's literature. Oxford: Oxford University Press.
  • Hahn, R. W. & Layne-Farrar, A. (2006). The law and economics of software security. Harvard Journal of Law & Public Policy, 30(1), 283.
  • honey-pot. (2008). [Online]. Available: pot?cat=technology.
  • Neeley, D. (2000, March). BackOfficer Friendly. Security Management, 44(3), 34.

Cite this Research Proposal:

APA Format

Website Honeypots (2009, March 18) Retrieved April 18, 2021, from

MLA Format

"Website Honeypots" 18 March 2009. Web. 18 April. 2021. <>