Vulnerability Assessment using Honeypots
- 1 December 2004
- journal article
- research article
- Published by Walter de Gruyter GmbH in PIK - Praxis der Informationsverarbeitung und Kommunikation
- Vol. 27 (4) , 195-201
- https://doi.org/10.1515/piko.2004.195
Abstract
Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data collected through them, honeynets are considered a useful tool to learn more about attack patterns and attacker behavior in real networks. This paper explains the motivation for using the honeynet methodology and describes experiences with a honeynet at RWTH Aachen University. In analyzing the data collected through our experiment, we discuss the value of honeynets for computer vulnerability assessment. The paper also gives an overview over ethical and legal aspects of honeypots and a look on possible directions for further research.Keywords
This publication has 0 references indexed in Scilit: