{"id":6047,"date":"2025-09-10T12:25:23","date_gmt":"2025-09-10T10:25:23","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=6047"},"modified":"2026-03-27T12:30:44","modified_gmt":"2026-03-27T11:30:44","slug":"deploying-honeypots-and-honeynets-issues-of-liability","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issues-of-liability\/","title":{"rendered":"Deploying honeypots and honeynets: Issues of liability"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6047\" class=\"elementor elementor-6047\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f6d137 e-con-full e-flex e-con e-child\" data-id=\"9f6d137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd553b0 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"dd553b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_dd553b0 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_dd553b0{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_dd553b0:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_dd553b0:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_dd553b0\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tArticle\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5fbe9 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"ad5fbe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_ad5fbe9 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_ad5fbe9{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_ad5fbe9:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_ad5fbe9\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;#038;hl=sk&amp;#038;user=JXxir4oAAAAJ&amp;#038;cstart=20&amp;#038;pagesize=80&amp;#038;sortby=pubdate&amp;#038;citation_for_view=JXxir4oAAAAJ:Se3iqnhoufwC\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-link'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tLink to Google Scholar\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Authors: <\/b>Pavol Sokol, Maro\u0161 Andrejko<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Honeypots and honeynets are common tools for network security and network forensics. The deployment and usage of these tools is affected by a number of the technical and legal issues. It is very important to consider both issues together. Therefore, paper outlines technical aspects of honeynet and discusses the liability of honeypot\u2019s and honeynet\u2019s administrator. Paper deals with civil and criminal liability. Also paper focuses on cybercrime and liability of attackers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aa2729 elementor-widget elementor-widget-text-editor\" data-id=\"0aa2729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Due to rapid growth of information and transfer messages, network security has become an increasingly important part of modern society. Traditional security tools, methods and techniques applied in protection are currently becoming increasingly ineffective. It is due to the fact that hackers\u2019 communities are several steps ahead of security mechanisms (firewalls, sandboxes etc.). Therefore it is necessary to collect and investigate as much information as possible about these communities.<\/p><p>From this point of view, honeypot seems to be very useful tool [<a id=\"ref-link-section-d54267656e426\" title=\" Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118\u2013127. Springer, Heidelberg (2014) \" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR1\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 1\">1<\/a>]. It can be defined as \u201ca system that has been deployed on a network for the purpose of logging and studying attacks on itself\u201d [<a id=\"ref-link-section-d54267656e429\" title=\"Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15\u201323. IEEE (2004)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR2\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 2\">2<\/a>]. The most widespread classification is classification based on the level of interaction. There are low-level interaction and high-level interaction honeypots. On one hand, low-level interaction honeypots emulate the characteristics of network services or a particular operating system. On the other hand, a complete operating system with all services is used to get more accurate information about attacks and attackers. This type of honeypot is called high-level interaction honeypot.<\/p><p>Concept of honeypot is extended by a special kind of high-level interaction honeypot \u2013 honeynet. It is a highly controlled network of honeypots [<a id=\"ref-link-section-d54267656e435\" title=\"The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison-Wesley, Boston (2004)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR3\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 3\">3<\/a>]. The honeynet can be also referred to as \u201ca virtual environment, consisting of multiple honeypots, designed to deceive an intruder into thinking that he or she has located a network of computing devices of targeting value\u201d [<a id=\"ref-link-section-d54267656e438\" title=\"Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1\u20136. IEEE, Australasian (2009)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR4\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 4\">4<\/a>]. The honeynet is composed of four core elements [<a id=\"ref-link-section-d54267656e441\" title=\"Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15\u201323. IEEE (2004)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR2\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 2\">2<\/a>,\u00a0<a id=\"ref-link-section-d54267656e444\" title=\"Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1\u20136. IEEE, Australasian (2009)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR4\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 4\">4<\/a>,\u00a0<a id=\"ref-link-section-d54267656e447\" title=\"Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 21\u201328. IEEE (2005)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-19419-6_9#ref-CR5\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 5\">5<\/a>]:<\/p><ul class=\"u-list-style-dash\"><li><p><i>Data control<\/i>\u00a0\u2013 purpose of this element is to control the attackers\u2019 activities,<\/p><\/li><li><p><i>Data capture<\/i>\u00a0\u2013 monitors and logs all of the attackers\u2019 activitiesthe,<\/p><\/li><li><p><i>Data collection<\/i>\u00a0\u2013 purpose of this element is to capture and collect all information from multiple honeynets,<\/p><\/li><li><p><i>Data analysis<\/i>\u00a0\u2013 purpose of this element is to analyse, understand and track the attacks and their activities.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Authors: Pavol Sokol, Maro\u0161 Andrejko<\/p>","protected":false},"author":9,"featured_media":5713,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[15],"tags":[],"class_list":["post-6047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=6047"}],"version-history":[{"count":8,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6047\/revisions"}],"predecessor-version":[{"id":8859,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6047\/revisions\/8859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/5713"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=6047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=6047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=6047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}