A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network.
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
Computers /
Security /
Internet /
Research
|