Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet
Reference:
Veerasamy, N and Eloff, JP. 2007. Framework for the establishment of a Honeynet. Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September, pp 6
Veerasamy, N., & Eloff, J. (2007). Framework for the establishment of a Honeynet. http://hdl.handle.net/10204/3149
Veerasamy, Namosha, and JP Eloff. "Framework for the establishment of a Honeynet." (2007): http://hdl.handle.net/10204/3149
Veerasamy N, Eloff J, Framework for the establishment of a Honeynet; 2007. http://hdl.handle.net/10204/3149 .