traffic. One option consists in using global telescopes or dark offer interesting views of global
trends. Another solution consists in centralizin logs and intrusion detection system alerts to
extract some information. In this advocate the usefulness of a third approach that focuses on
the need of local v more precise information on some attacks. With this idea in mind, we
have and deployed for the last six months a distributed honeypot environment distinct …