Document Type
Conference Proceeding
Publisher
Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
5080
Abstract
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified
Access Rights
free_to_read
Comments
Innes, S. , & Valli, C. (2006). Honeypots: How do you know when you're inside one?. Proceedings of Australian Digital Forensics Conference. (pp. 78-83). Edith Cowan University, Perth, Australia. Edith Cowan University. Available here