Honeypots: Tracking Hackers
IEEE Security and Privacy
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Honeynets: an educational resource for IT security
CITC5 '04 Proceedings of the 5th conference on Information technology education
The Kerf Toolkit for Intrusion Analysis
IEEE Security and Privacy
Honeypots: concepts, approaches, and challenges
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
TestCom '08 / FATES '08 Proceedings of the 20th IFIP TC 6/WG 6.1 international conference on Testing of Software and Communicating Systems: 8th International Workshop
Using self-organizing maps to build an attack map for forensic analysis
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
BotGrep: finding P2P bots with structured graph analysis
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
STEP: a unified design methodology for secure test and IP core protection
Proceedings of the great lakes symposium on VLSI
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
Journal of Systems and Software
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
One of the greatest challenges we face within the security community is information about the threats we face specifically, who the threats are, how they operate, and why. The Honeynet Project is an organization attempting to change that. Comprised of volunteers from around the world, the Honeynet Project is dedicated to studying the bad guys and sharing the lessons learned. The group gathers information by deploying networks (called honeynets) around the world to be compromised. This article details what a honeynet is, how the Honeynet Project works, gives examples of the information collected, and describes a future plan for distributed honeynet deployment.