dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Eloff, JP
|
|
dc.date.accessioned |
2009-03-06T11:20:50Z |
|
dc.date.available |
2009-03-06T11:20:50Z |
|
dc.date.issued |
2007-09 |
|
dc.identifier.citation |
Veerasamy, N and Eloff, JP. 2007. Framework for the establishment of a Honeynet. Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September, pp 6 |
en |
dc.identifier.isbn |
978-0-620-39351-5 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/3149
|
|
dc.description |
Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September 2007 |
en |
dc.description.abstract |
Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet |
en |
dc.language.iso |
en |
en |
dc.subject |
Honeypots |
en |
dc.subject |
Honeynet |
en |
dc.subject |
Framework |
en |
dc.title |
Framework for the establishment of a Honeynet |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Veerasamy, N., & Eloff, J. (2007). Framework for the establishment of a Honeynet. http://hdl.handle.net/10204/3149 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, and JP Eloff. "Framework for the establishment of a Honeynet." (2007): http://hdl.handle.net/10204/3149 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Eloff J, Framework for the establishment of a Honeynet; 2007. http://hdl.handle.net/10204/3149 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Eloff, JP
AB - Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet
DA - 2007-09
DB - ResearchSpace
DP - CSIR
KW - Honeypots
KW - Honeynet
KW - Framework
LK - https://researchspace.csir.co.za
PY - 2007
SM - 978-0-620-39351-5
T1 - Framework for the establishment of a Honeynet
TI - Framework for the establishment of a Honeynet
UR - http://hdl.handle.net/10204/3149
ER -
|
en_ZA |