Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

2894

Comments

This article was originally published as: Valli, C. (2005). Honeypot technologies and their applicability as an internal countermeasure. Proceedings of 3rd Austalian Computer, Network and Information Forensics Conference. (pp. 68-73). Perth, Western Australia. School of Computer and Information Science, Edith Cowan University.

Abstract

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.

Access Rights

free_to_read

 
COinS