ResearchSpace

Weems: An extensible HTTP honeypot

Show simple item record

dc.contributor.author Pearson, D
dc.contributor.author Irwin, Barry VW
dc.contributor.author Herbert, A
dc.date.accessioned 2017-10-25T12:44:25Z
dc.date.available 2017-10-25T12:44:25Z
dc.date.issued 2017-09
dc.identifier.citation Pearson, D., Irwin, B.V.W. and Herbert, A. 2017. Weems: An extensible HTTP honeypot. Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September 2017, Barcelona, Spain en_US
dc.identifier.uri http://www.satnac.org.za//proceedings/2017/SATNAC%202017%20Proceedings%20Final.pdf
dc.identifier.uri http://hdl.handle.net/10204/9691
dc.description Paper presented at http://www.satnac.org.za//proceedings/2017/SATNAC%202017%20Proceedings%20Final.pdf en_US
dc.description.abstract Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists deploy various network defenses with the goal preventing these threats; one such tool used are web based honeypots. Historically a honeypot will be deployed facing the Internet to masquerade as a live system with the intention of attracting attackers away from the valuable data. Researchers adapted these honeypots and turned them into a platform to allow for the studying and understanding of web attacks and threats on the Internet. Having the ability to develop a honeypot to replicate a specific service meant researchers can now study the behavior patterns of threats, thus giving a better understanding of how to defend against them. This paper discusses a high-level design and implementation of Weems, a low-interaction web based modular HTTP honeypot system. It also presents results obtained from various deployments over a period of time and what can be interpreted from these results. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;19652
dc.subject Internet security en_US
dc.subject Network security en_US
dc.subject HTTP Honeypots en_US
dc.title Weems: An extensible HTTP honeypot en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Pearson, D., Irwin, B. V., & Herbert, A. (2017). Weems: An extensible HTTP honeypot. http://hdl.handle.net/10204/9691 en_ZA
dc.identifier.chicagocitation Pearson, D, Barry VW Irwin, and A Herbert. "Weems: An extensible HTTP honeypot." (2017): http://hdl.handle.net/10204/9691 en_ZA
dc.identifier.vancouvercitation Pearson D, Irwin BV, Herbert A, Weems: An extensible HTTP honeypot; 2017. http://hdl.handle.net/10204/9691 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Pearson, D AU - Irwin, Barry VW AU - Herbert, A AB - Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists deploy various network defenses with the goal preventing these threats; one such tool used are web based honeypots. Historically a honeypot will be deployed facing the Internet to masquerade as a live system with the intention of attracting attackers away from the valuable data. Researchers adapted these honeypots and turned them into a platform to allow for the studying and understanding of web attacks and threats on the Internet. Having the ability to develop a honeypot to replicate a specific service meant researchers can now study the behavior patterns of threats, thus giving a better understanding of how to defend against them. This paper discusses a high-level design and implementation of Weems, a low-interaction web based modular HTTP honeypot system. It also presents results obtained from various deployments over a period of time and what can be interpreted from these results. DA - 2017-09 DB - ResearchSpace DP - CSIR KW - Internet security KW - Network security KW - HTTP Honeypots LK - https://researchspace.csir.co.za PY - 2017 T1 - Weems: An extensible HTTP honeypot TI - Weems: An extensible HTTP honeypot UR - http://hdl.handle.net/10204/9691 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record