Logo des Repositoriums
 

Honeypots and limitations of deception

dc.contributor.authorDornseif, Maximillian
dc.contributor.authorHolz, Thorsten
dc.contributor.authorMüller, Sven
dc.contributor.editorKnop, Jan Von
dc.contributor.editorHaverkamp, Wilhelm
dc.contributor.editorJessen, Eike
dc.date.accessioned2019-10-11T11:21:37Z
dc.date.available2019-10-11T11:21:37Z
dc.date.issued2005
dc.description.abstractTo learn more about attack patterns and attacker behavior, the concept of electronic decoys - usually network resources (computers, routers, or switches) deployed to be probed, attacked, and compromised – is currently en vogue in the area of IT security under the name honeypots. These electronic baits claim to lure in attackers and help in assessment of vulnerabilities. We give a basic introduction into honeypot concepts and present exemplary honeypot-based research in the area of phishing. Because honeypots are more and more deployed within computer networks, malicious attackers start to devise techniques to detect and circumvent these security tools. In the second part of this paper we focus on limitations of current honeypotbased methodologies. We show how an attacker typically proceeds when attacking this kind of systems and present diverse tools and methods of deception and counter deception.en
dc.identifier.isbn3-88579-402-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/28613
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartof„Heute schon das Morgen sehen“, 19. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-73
dc.titleHoneypots and limitations of deceptionen
dc.typeText/Conference Paper
gi.citation.endPage252
gi.citation.publisherPlaceBonn
gi.citation.startPage235
gi.conference.date18.-20.5.2005
gi.conference.locationDüüseldorf
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings.73-14.pdf
Größe:
232.57 KB
Format:
Adobe Portable Document Format