Logo des Repositoriums
 
Konferenzbeitrag

Honeypots and limitations of deception

Lade...
Vorschaubild

Volltext URI

Dokumententyp

Text/Conference Paper

Zusatzinformation

Datum

2005

Zeitschriftentitel

ISSN der Zeitschrift

Bandtitel

Verlag

Gesellschaft für Informatik e.V.

Zusammenfassung

To learn more about attack patterns and attacker behavior, the concept of electronic decoys - usually network resources (computers, routers, or switches) deployed to be probed, attacked, and compromised – is currently en vogue in the area of IT security under the name honeypots. These electronic baits claim to lure in attackers and help in assessment of vulnerabilities. We give a basic introduction into honeypot concepts and present exemplary honeypot-based research in the area of phishing. Because honeypots are more and more deployed within computer networks, malicious attackers start to devise techniques to detect and circumvent these security tools. In the second part of this paper we focus on limitations of current honeypotbased methodologies. We show how an attacker typically proceeds when attacking this kind of systems and present diverse tools and methods of deception and counter deception.

Beschreibung

Dornseif, Maximillian; Holz, Thorsten; Müller, Sven (2005): Honeypots and limitations of deception. „Heute schon das Morgen sehen“, 19. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 3-88579-402-0. pp. 235-252. Regular Research Papers. Düüseldorf. 18.-20.5.2005

Schlagwörter

Zitierform

DOI

Tags