ResearchSpace

Framework for the establishment of a Honeynet

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Eloff, JP
dc.date.accessioned 2009-03-06T11:20:50Z
dc.date.available 2009-03-06T11:20:50Z
dc.date.issued 2007-09
dc.identifier.citation Veerasamy, N and Eloff, JP. 2007. Framework for the establishment of a Honeynet. Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September, pp 6 en
dc.identifier.isbn 978-0-620-39351-5
dc.identifier.uri http://hdl.handle.net/10204/3149
dc.description Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September 2007 en
dc.description.abstract Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet en
dc.language.iso en en
dc.subject Honeypots en
dc.subject Honeynet en
dc.subject Framework en
dc.title Framework for the establishment of a Honeynet en
dc.type Conference Presentation en
dc.identifier.apacitation Veerasamy, N., & Eloff, J. (2007). Framework for the establishment of a Honeynet. http://hdl.handle.net/10204/3149 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, and JP Eloff. "Framework for the establishment of a Honeynet." (2007): http://hdl.handle.net/10204/3149 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Eloff J, Framework for the establishment of a Honeynet; 2007. http://hdl.handle.net/10204/3149 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AU - Eloff, JP AB - Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet DA - 2007-09 DB - ResearchSpace DP - CSIR KW - Honeypots KW - Honeynet KW - Framework LK - https://researchspace.csir.co.za PY - 2007 SM - 978-0-620-39351-5 T1 - Framework for the establishment of a Honeynet TI - Framework for the establishment of a Honeynet UR - http://hdl.handle.net/10204/3149 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record