• DocumentCode
    3077097
  • Title

    Experiences with Honeypot Systems: Development, Deployment, and Analysis

  • Author

    McGrew, R.

  • Author_Institution
    Mississippi State University
  • Volume
    9
  • fYear
    2006
  • fDate
    04-07 Jan. 2006
  • Abstract
    This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other purpose on a network than to be a target for attackers, and log data about the attacks. Low-interaction and high-interaction honeypots were implemented and deployed on a university network, and data was logged and analyzed about attacks that occurred during the honeypots’ deployment. Current efforts in the "black hat" attacker community focusing on detecting and subverting honeypots are discussed, and recommendations are made to improve the usage of honeypots as an attack profiling tool by improving the control measures that make a honeypot easy to detect.
  • Keywords
    Computer networks; Computer science; Current measurement; Data engineering; File systems; Operating systems; Performance analysis; Production systems; TCPIP; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on
  • ISSN
    1530-1605
  • Print_ISBN
    0-7695-2507-5
  • Type

    conf

  • DOI
    10.1109/HICSS.2006.172
  • Filename
    1579742