Lessons learned from the deployment of a high-interaction honeypot

@article{Alata2006LessonsLF,
  title={Lessons learned from the deployment of a high-interaction honeypot},
  author={Eric Alata and Vincent Nicomette and Mohamed Ka{\^a}niche and Marc Dacier and Matthieu Herrb},
  journal={2006 Sixth European Dependable Computing Conference},
  year={2006},
  pages={39-46}
}
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots 

Tables and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 63 CITATIONS

Machine Learning for Detecting Brute Force Attacks at the Network Level

  • 2014 IEEE International Conference on Bioinformatics and Bioengineering
  • 2014
VIEW 12 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Honeypots in the Cloud

VIEW 11 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Profiling Attacker Behavior Following SSH Compromises

  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)
  • 2007
VIEW 3 EXCERPTS
CITES RESULTS & METHODS
HIGHLY INFLUENCED

Detection of Malicious Remote Shell Sessions

  • 2019 11th International Conference on Cyber Conflict (CyCon)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Human vs Bots: Detecting Human Attacks in a Honeypot Environment

  • 2019 7th International Symposium on Digital Forensics and Security (ISDFS)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2006
2019

CITATION STATISTICS

  • 4 Highly Influenced Citations

References

Publications referenced by this paper.
SHOWING 1-7 OF 7 REFERENCES

Lessons learned from the deployment of a highinteraction honeypot: Extended version

E. Alata, V. Nicomette, M. Kaaniche, M. Dacier, M. Herrb
  • LAAS Report,
  • 2006
VIEW 1 EXCERPT

Detecting honeypots and other suspicious environments

  • Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop
  • 2005
VIEW 1 EXCERPT

Honeypots: practical means to validate malicious fault assumptions

  • 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.
  • 2004