Lessons learned from the deployment of a high-interaction honeypot

E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six …

Experiences with honeypot systems: Development, deployment, and analysis

R McGrew - Proceedings of the 39th Annual Hawaii …, 2006 - ieeexplore.ieee.org
This paper presents a summary of university research performed on honeypot techniques
and summarizes the results Honeypots are computing resources that serve no other …

[PDF][PDF] Honeyc-the low-interaction client honeypot

C Seifert, I Welch, P Komisarczuk - Proceedings of the 2007 NZCSRCS …, 2007 - Citeseer
A honeypot is a security device that is designed to lure malicious activity to itself. Capturing
such malicious activity allows for studying it to understand the operations and motivation of …

Honeypots: Practical means to validate malicious fault assumptions

M Dacier, F Pouget, H Debar - 10th IEEE Pacific Rim …, 2004 - ieeexplore.ieee.org
We report on an experiment run with several honeypots for 4 months. The motivation of this
work resides in our wish to use data collected by honeypots to validate fault assumptions …

On recognizing virtual honeypots and countermeasures

X Fu, W Yu, D Cheng, X Tan, K Streff… - 2006 2nd IEEE …, 2006 - ieeexplore.ieee.org
Honeypots are decoys designed to trap, delay, and gather information about attackers. We
can use honeypot logs to analyze attackers' behaviors and design new defenses. A virtual …

A pointillist approach for comparing honeypots

F Pouget, T Holz - Detection of Intrusions and Malware, and Vulnerability …, 2005 - Springer
Our research focuses on the usage of honeypots for gathering detailed statistics on the
Internet threats over a long period of time. In this context, we are deploying honeypots …

Honeypots: Catching the insider threat

L Spitzner - 19th Annual Computer Security Applications …, 2003 - ieeexplore.ieee.org
In the past several years there has been extensive research into honeypot technologies,
primarily for detection and information gathering against external threats. However, little …

Honeypot: a supplemented active defense system for network security

F Zhang, S Zhou, Z Qin, J Liu - Proceedings of the Fourth …, 2003 - ieeexplore.ieee.org
A honeypot is a supplemented active defense system for network security. It traps attacks,
records intrusion information about tools and activities of the hacking process, and prevents …

Honeyware: a web-based low interaction client honeypot

Y Alosefer, O Rana - 2010 Third International Conference on …, 2010 - ieeexplore.ieee.org
Modern attacks are being made against client side applications, such as web browsers,
which most users use to surf and communicate on the internet. Client honeypots visit and …

Taxonomy of honeypots

C Seifert, I Welch, P Komisarczuk - Victoria University of Wellington …, 2006 - mcs.vuw.ac.nz
In this paper, we present a taxonomy of honeypots. This taxonomy adheres to the
characteristics defined by Lindqvist et al and Krsul. We describe how to assign honeypots to …