The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Deploying Honeynets
Abstract
When competent computer network system administrators are faced with malicious activity on their networks, they think of the problem in terms of four distinct but related activities: detection, prevention, mitigation, and response. The greatest challenge of these four phases is detection. Typically, detection comes in the form of intrusion detection system (IDS) alerts and automated application and log monitors. These however are fraught with mischaracterized alerts that leave administrators looking for a needle in a haystack. One of the most promising emerging security tools is the honeynet Honeynets are designed to divert the malicious user or attacker to non-production systems that are carefully monitored and configured to allow detailed analysis of the attackers’ actions and also protection of other network resources. Honeynets can be configured in many different ways and implemented from a full DMZ to a carefully placed file that is monitored for access.
Related Content
Margee Hume, Paul Johnston.
© 2017.
19 pages.
|
Jessy Nair, D. Bhanu Sree Reddy.
© 2017.
27 pages.
|
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski.
© 2017.
19 pages.
|
Klaus Wölfel.
© 2017.
33 pages.
|
Rui Pedro Marques.
© 2017.
21 pages.
|
Ebru E. Saygili, Arikan Tarik Saygili.
© 2017.
17 pages.
|
Aparna Raman, D. P. Goyal.
© 2017.
41 pages.
|
|
|