Document Type
Conference Proceeding
Publisher
Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
5080
Abstract
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified
DOI
10.4225/75/57b131f0c7052
Access Rights
free_to_read
Comments
Innes, S. , & Valli, C. (2006). Honeypots: How do you know when you're inside one?. Proceedings of Australian Digital Forensics Conference. (pp. 78-83). Edith Cowan University, Perth, Australia. Edith Cowan University. Available here