Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

2894

Comments

This article was originally published as: Valli, C. (2005). Honeypot technologies and their applicability as an internal countermeasure. Proceedings of 3rd Austalian Computer, Network and Information Forensics Conference. (pp. 68-73). Perth, Western Australia. School of Computer and Information Science, Edith Cowan University.

Abstract

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.

Access Rights

free_to_read

 
COinS