Honeypot utilization for analyzing cyber attacks

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers’ motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

Otto Hrad, Simo Kemppainen (University of Jyväskylä): Honeypot utilization for analyzing cyber attacks

Presented at ECSAW ’16, the 10th European Conference on Software Architecture Workshops, November 28 – December 02, 2016, Copenhagen

http://dl.acm.org/citation.cfm?doid=2993412.2993415

 

Share on LinkedInGoogle+Tweet about this on TwitterShare on FacebookEmail to someone