• Corpus ID: 14012614

White Paper : Honeypots

@inproceedings{Baumann2002WhiteP,
  title={White Paper : Honeypots},
  author={Reto Baumann},
  year={2002}
}
4 Concepts 3 4.1 Level of Involvement . . . . . . . . . . . . 3 4.1.1 Low-Involvement Honeypot . . . . 3 4.1.2 Mid-Involvement Honeypot . . . . 3 4.1.3 High-Involvement Honeypot . . . . 3 4.1.4 Overview . . . . . . . . . . . . . . 4 4.2 Network Topologies and Honeynets . . . . 4 4.2.1 Honeypot Location . . . . . . . . . 4 4.2.2 Honeynets . . . . . . . . . . . . . . 5 4.3 Host based Information Gathering . . . . 5 4.3.1 Basic Possibilities . . . . . . . . . . 6 4.3.2 Microsoft Windows… 

Figures and Tables from this paper

A proposal for securing a large-scale high-interaction honeypot

This paper presents the design of a secured high-interaction honeypot that welcomes attackers, allows userland malicious activities but prevents from system corruption, and the hardening of the honeypot is proposed for two kinds of host.

Security and Results of a Large-Scale High-Interaction Honeypot

The design and results of a secured high-interaction honeypot that welcomes attackers, allows userland malicious activities but prevents system corruption and a correlation eases a complete analysis for the host and network activities is presented.

Honeypots : The Need of Network Security

This review paper reveals about the different kind of honeypots their level of interaction and risks associated with them, and about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network.

Deception in Web Application Honeypots: Case of Glastopf

Some of the limitations inherent in Glastopf are described, and possible ways to make it more deceptive and more attractive to attack-ers are proposed.

Benefits of Honeypots in Education Sector

The research related to honeypot is still underway in the IT security Lab and conclusion of the research is to provide an effective educational resource and tool to help and solve the challenges in IT security education.

Paper on Honeypot Mechanism – the Autonomous Hybrid Solution for Enhancing

This topic is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.

White Paper : “ Honeypot , Honeynet , Honeytoken : Terminological issues 1 ”

This document offers a summary of the various proposals for honeypots, honeynets and other honeytokens proposed during the last 3 years and discusses their advantages and drawbacks.

Advance Honeypot Mechanism- The Hybrid Solution for Enhancing Computer System Security with DoS

This topic is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.

Sophisticated Honeypot mechanism - the autonomous hybrid solution for enhancing computer system security

This paper is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.

Implementation of Honeypots for Server Security

Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users.

Project Honeynet

    Oct
  • 2001

Network Intrusion Detection: An Analysis Handbook

    New Riders Publishing,
  • 1999

Dragon Claws it’s way to the top

    Network Computing, Aug
  • 2001

Hacking Exposed 2nd Edition

    Computing McGraw-Hill, second edition,
  • 2000