To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?

by   Jason M. Pittman, et al.

Cyber threats, such as advanced persistent threats (APTs), ransomware, and zero-day exploits, are rapidly evolving and demand improved security measures. Honeypots and honeynets, as deceptive systems, offer valuable insights into attacker behavior, helping researchers and practitioners develop innovative defense strategies and enhance detection mechanisms. However, their deployment involves significant maintenance and overhead expenses. At the same time, the complexity of modern computing has prompted the rise of autonomic computing, aiming for systems that can operate without human intervention. Recent honeypot and honeynet research claims to incorporate autonomic computing principles, often using terms like adaptive, dynamic, intelligent, and learning. This study investigates such claims by measuring the extent to which autonomic principles principles are expressed in honeypot and honeynet literature. The findings reveal that autonomic computing keywords are present in the literature sample, suggesting an evolution from self-adaptation to autonomic computing implementations. Yet, despite these findings, the analysis also shows low frequencies of self-configuration, self-healing, and self-protection keywords. Interestingly, self-optimization appeared prominently in the literature. While this study presents a foundation for the convergence of autonomic computing and deceptive systems, future research could explore technical implementations in sample articles and test them for autonomic behavior. Additionally, investigations into the design and implementation of individual autonomic computing principles in honeypots and determining the necessary ratio of these principles for a system to exhibit autonomic behavior could provide valuable insights for both researchers and practitioners.


page 1

page 2

page 3

page 4


Cyber security and the Leviathan

Dedicated cyber-security functions are common in commercial businesses, ...

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated...

Comparison of Self-Aware and Organic Computing Systems

With increasing complexity and heterogeneity of computing devices, it ha...

Understanding motivations and characteristics of financially-motivated cybercriminals

Background: Cyber offences, such as hacking, malware creation and distri...

A Self-Adaptive Network Protection System

In this treatise we aim to build a hybrid network automated (self-adapti...

Grand challenges in social physics: In pursuit of moral behavior

Methods of statistical physics have proven valuable for studying the evo...

Please sign up or login with your details

Forgot password? Click here to reset