Veerasamy, NamoshaEloff, JP2009-03-062009-03-062007-09Veerasamy, N and Eloff, JP. 2007. Framework for the establishment of a Honeynet. Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September, pp 6978-0-620-39351-5http://hdl.handle.net/10204/3149Southern African Telecommunication Networks and Applications Conference (SATNAC 2007), Mauritius, 9-13 September 2007Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a HoneynetenHoneypotsHoneynetFrameworkFramework for the establishment of a HoneynetConference PresentationVeerasamy, N., & Eloff, J. (2007). Framework for the establishment of a Honeynet. http://hdl.handle.net/10204/3149Veerasamy, Namosha, and JP Eloff. "Framework for the establishment of a Honeynet." (2007): http://hdl.handle.net/10204/3149Veerasamy N, Eloff J, Framework for the establishment of a Honeynet; 2007. http://hdl.handle.net/10204/3149 .TY - Conference Presentation AU - Veerasamy, Namosha AU - Eloff, JP AB - Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet DA - 2007-09 DB - ResearchSpace DP - CSIR KW - Honeypots KW - Honeynet KW - Framework LK - https://researchspace.csir.co.za PY - 2007 SM - 978-0-620-39351-5 T1 - Framework for the establishment of a Honeynet TI - Framework for the establishment of a Honeynet UR - http://hdl.handle.net/10204/3149 ER -