Home Library & Information Science, Book Studies Vulnerability Assessment using Honeypots
Article
Licensed
Unlicensed Requires Authentication

Vulnerability Assessment using Honeypots

  • M. Dornseif , F. C. Gärtner and T. Holz
Published/Copyright: December 14, 2007
Become an author with De Gruyter Brill
PIK - Praxis der Informationsverarbeitung und Kommunikation
From the journal Volume 27 Issue 4

ABSTRACT

Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data collected through them, honeynets are considered a useful tool to learn more about attack patterns and attacker behavior in real networks. This paper explains the motivation for using the honeynet methodology and describes experiences with a honeynet at RWTH Aachen University. In analyzing the data collected through our experiment, we discuss the value of honeynets for computer vulnerability assessment. The paper also gives an overview over ethical and legal aspects of honeypots and a look on possible directions for further research.

Published Online: 2007-12-14
Published in Print: 2004-December

© Copyright by K.G. Saur Verlag 2004

Downloaded on 31.1.2026 from https://www.degruyterbrill.com/document/doi/10.1515/PIKO.2004.195/html
Scroll to top button