DocumentCode
3307807
Title
An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network
Author
Jackson, Timothy R. ; Levine, John G. ; Grizzard, Julian B. ; Owen, Henry L.
Author_Institution
Georgia Inst. of Technol., Atlanta, GA, USA
fYear
2004
fDate
10-11 June 2004
Firstpage
9
Lastpage
14
Abstract
The growth of network intrusions on large enterprise networks continues to increase, creating an epidemic of compromised hosts. The deployment of firewalls and intrusion detection systems has not slowed the growth of intrusions to an acceptable rate. Investigating the compromise of a production machine is both difficult and time-consuming due to the mixing of attack and production traffic, while similar investigations of compromised machines on honeynets are much less complex since there is no real production traffic. We discuss why these investigations are easier on a honeynet and how honeynets may be used to make investigations of compromised production machines faster and recovery easier. We include a description of an attack and the analysis that was conducted.
Keywords
authorisation; computer networks; telecommunication security; telecommunication traffic; virtual enterprises; firewall; intrusion detection system; large enterprise network; network intrusion; production machine; production traffic; real production traffic; Communication system traffic control; Computer hacking; Computer networks; Computer worms; Educational institutions; IP networks; Intrusion detection; Production; Protection; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN
0-7803-8572-1
Type
conf
DOI
10.1109/IAW.2004.1437791
Filename
1437791
Link To Document