Enter Domain Name:

Top / Computers / Security / Honeypots_and_Honeynets /

HoneyNet Project
A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
http://project.honeynet.org/
Honeynet.org  ~   Site Info   Whois   Trace Route   RBL Check  
Honeyd
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
http://www.citi.umich.edu/u/provos/honeyd/
Umich.edu  ~   Site Info   Whois   Trace Route   RBL Check  
Honeypots
Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
http://www.honeypots.net/
Honeypots.net  ~   Site Info   Whois   Trace Route   RBL Check  
SourceForge.net: Project - HoneyView
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
http://sourceforge.net/projects/honeyview
Sourceforge.net  ~   Site Info   Whois   Trace Route   RBL Check  
Deception ToolKit (DTK)
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
http://all.net/dtk/index.html
All.net  ~   Site Info   Whois   Trace Route   RBL Check  
SecurityFocus: Dynamic Honeypots
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network.
http://www.securityfocus.com/infocus/1731
Securityfocus.com  ~   Site Info   Whois   Trace Route   RBL Check  
SecurityFocus: Fighting Internet Worms With Honeypots
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.
http://www.securityfocus.com/infocus/1740
Securityfocus.com  ~   Site Info   Whois   Trace Route   RBL Check  
SecurityFocus: Honeytokens -The Other Honeypot
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.
http://www.securityfocus.com/infocus/1713
Securityfocus.com  ~   Site Info   Whois   Trace Route   RBL Check  
An Evening with Berferd
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
http://all.net/books/berferd/berferd.html
All.net  ~   Site Info   Whois   Trace Route   RBL Check  
SecurityFocus: Problems and Challenges with Honeypots
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
http://www.securityfocus.com/infocus/1757
Securityfocus.com  ~   Site Info   Whois   Trace Route   RBL Check  
 


Page 1/8« Previous12345Next »