Deployment of a low interaction honeypot in an organizational private network

2011 
This paper describes a case study of Honey pot deployment in an organizational network. As per Wikipedia “honey pot is a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems” [05]. These traps could be any digital resource ranging from a single computer to a network of such computers or a network application that appears to be a part of organizational network resources but is actually a fake resource with no production traffic. Further these resources are closely monitored and the traffic to and from these resources is well under the control of the administrator. In the experiment performed in this paper, such a trap is laid in the form of a low interaction honeypot honeyd [01] in the perimeter security of an organizational network. The results of deployment are presented and further various props and cons of such deployments are brought about.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    5
    Citations
    NaN
    KQI
    []