DocumentCode :
3307807
Title :
An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network
Author :
Jackson, Timothy R. ; Levine, John G. ; Grizzard, Julian B. ; Owen, Henry L.
Author_Institution :
Georgia Inst. of Technol., Atlanta, GA, USA
fYear :
2004
fDate :
10-11 June 2004
Firstpage :
9
Lastpage :
14
Abstract :
The growth of network intrusions on large enterprise networks continues to increase, creating an epidemic of compromised hosts. The deployment of firewalls and intrusion detection systems has not slowed the growth of intrusions to an acceptable rate. Investigating the compromise of a production machine is both difficult and time-consuming due to the mixing of attack and production traffic, while similar investigations of compromised machines on honeynets are much less complex since there is no real production traffic. We discuss why these investigations are easier on a honeynet and how honeynets may be used to make investigations of compromised production machines faster and recovery easier. We include a description of an attack and the analysis that was conducted.
Keywords :
authorisation; computer networks; telecommunication security; telecommunication traffic; virtual enterprises; firewall; intrusion detection system; large enterprise network; network intrusion; production machine; production traffic; real production traffic; Communication system traffic control; Computer hacking; Computer networks; Computer worms; Educational institutions; IP networks; Intrusion detection; Production; Protection; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
Type :
conf
DOI :
10.1109/IAW.2004.1437791
Filename :
1437791
Link To Document :
بازگشت