White Paper : Honeypots
@inproceedings{Baumann2002WhiteP, title={White Paper : Honeypots}, author={Reto Baumann}, year={2002} }
4 Concepts 3 4.1 Level of Involvement . . . . . . . . . . . . 3 4.1.1 Low-Involvement Honeypot . . . . 3 4.1.2 Mid-Involvement Honeypot . . . . 3 4.1.3 High-Involvement Honeypot . . . . 3 4.1.4 Overview . . . . . . . . . . . . . . 4 4.2 Network Topologies and Honeynets . . . . 4 4.2.1 Honeypot Location . . . . . . . . . 4 4.2.2 Honeynets . . . . . . . . . . . . . . 5 4.3 Host based Information Gathering . . . . 5 4.3.1 Basic Possibilities . . . . . . . . . . 6 4.3.2 Microsoft Windows…
No Paper Link Available
Figures and Tables from this paper
19 Citations
A proposal for securing a large-scale high-interaction honeypot
- 2008
Computer Science
HiPC 2008
This paper presents the design of a secured high-interaction honeypot that welcomes attackers, allows userland malicious activities but prevents from system corruption, and the hardening of the honeypot is proposed for two kinds of host.
Security and Results of a Large-Scale High-Interaction Honeypot
- 2009
Computer Science
J. Comput.
The design and results of a secured high-interaction honeypot that welcomes attackers, allows userland malicious activities but prevents system corruption and a correlation eases a complete analysis for the host and network activities is presented.
Honeypots : The Need of Network Security
- 2014
Computer Science
This review paper reveals about the different kind of honeypots their level of interaction and risks associated with them, and about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network.
Deception in Web Application Honeypots: Case of Glastopf
- 2017
Computer Science
Some of the limitations inherent in Glastopf are described, and possible ways to make it more deceptive and more attractive to attack-ers are proposed.
Benefits of Honeypots in Education Sector
- 2011
Computer Science
The research related to honeypot is still underway in the IT security Lab and conclusion of the research is to provide an effective educational resource and tool to help and solve the challenges in IT security education.
Paper on Honeypot Mechanism – the Autonomous Hybrid Solution for Enhancing
- 2014
Computer Science
This topic is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.
White Paper : “ Honeypot , Honeynet , Honeytoken : Terminological issues 1 ”
- 2003
Computer Science
This document offers a summary of the various proposals for honeypots, honeynets and other honeytokens proposed during the last 3 years and discusses their advantages and drawbacks.
Advance Honeypot Mechanism- The Hybrid Solution for Enhancing Computer System Security with DoS
- 2015
Computer Science
This topic is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.
Sophisticated Honeypot mechanism - the autonomous hybrid solution for enhancing computer system security
- 2013
Computer Science
2013 IEEE 11th International Symposium on Applied Machine Intelligence and Informatics (SAMI)
This paper is devoted to sophisticated hybrid Honeypot with autonomous feature that allows to, based on the collected system parameters, adapt to the system of deployment.
Implementation of Honeypots for Server Security
- 2016
Computer Science
Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users.
5 References
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response
- 1999
Geography
Project Honeynet
- 2001
Oct
Network Intrusion Detection: An Analysis Handbook
- 1999
New Riders Publishing,
Dragon Claws it’s way to the top
- 2001
Network Computing, Aug
Hacking Exposed 2nd Edition
- 2000
Computing McGraw-Hill, second edition,