IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Honeypots and Honeynets: Analysis and Case Study

Honeypots and Honeynets: Analysis and Case Study
View Sample PDF
Author(s): José Manuel Fernández Marín (University of Almería, Spain), Juan Álvaro Muñoz Naranjo (University of Almería, Spain)and Leocadio González Casado (University of Almería, Spain)
Copyright: 2015
Pages: 31
Source title: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal)and Irene Maria Portela (Polytechnic Institute of Cávado and Ave, Portugal)
DOI: 10.4018/978-1-4666-6324-4.ch029

Purchase

View Honeypots and Honeynets: Analysis and Case Study on the publisher's website for pricing and purchasing information.

Abstract

This chapter presents a review and a case of study of honeypots and honeynets. First, some of the most important and widely used honeypots in the current market are selected for comparative analysis, evaluating their interaction capacity with an attacker. Second, a self-contained honeynet architecture is implemented with virtual machines. An intrusion test is performed against the honeynet to observe the quality and quantity of the information collected during the attack. The final goal of this analysis is to assess the capacity of monitoring and threat detection of the honeynets and honeypots.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom