Document Type

Conference Proceeding

Keywords

honeypot, internal, misuse, IDS, firewall

Publisher

School of Computer and Information Science, Edith Cowan University

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

2894

Comments

This is an Author's Accepted Manuscript of: Valli, C. (2005). Honeypot technologies and their applicability as an internal countermeasure. Proceedings of 3rd Austalian Computer, Network and Information Forensics Conference. (pp. 68-73). Perth, Western Australia. School of Computer and Information Science, Edith Cowan University.

Abstract

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.

Access Rights

free_to_read

Share

 
COinS