Document Type
Conference Proceeding
Keywords
honeypot, internal, misuse, IDS, firewall
Publisher
School of Computer and Information Science, Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
2894
Abstract
Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.
Access Rights
free_to_read
Comments
This is an Author's Accepted Manuscript of: Valli, C. (2005). Honeypot technologies and their applicability as an internal countermeasure. Proceedings of 3rd Austalian Computer, Network and Information Forensics Conference. (pp. 68-73). Perth, Western Australia. School of Computer and Information Science, Edith Cowan University.