Document Type

Conference Proceeding

Publisher

Edith Cowan University

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

5080

Comments

This article was originally published as: Innes, S. , & Valli, C. (2006). Honeypots: How do you know when you're inside one?. Proceedings of Australian Digital Forensics Conference. (pp. 78-83). Edith Cowan University, Perth, Australia. Edith Cowan University. Original article available here

Abstract

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified

DOI

10.4225/75/57b131f0c7052

Access Rights

free_to_read

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57b131f0c7052