Luring Killer Bees With Honey
Source: NetworkComputing - Posted by Dave Wreski   
Intrusion Detection This August 2000 article describes honeypots, the legal aspects, and how to integrate it into your network. "According to the general definition, a honey pot's goal is to emulate production servers while alerting and logging intruder activity. How it should achieve . . . This August 2000 article describes honeypots, the legal aspects, and how to integrate it into your network. "According to the general definition, a honey pot's goal is to emulate production servers while alerting and logging intruder activity. How it should achieve that goal, however, is open to interpretation. Examining six products that vendors are peddling as honey pots, I compiled the lowest common denominator of features among them.

All the honey-pot packages aim to provide a working facade capable of enticing would-be intruders into using the service, and then coaxing them into displaying malicious intent. The extent of emulation offered by the packages varies (see "Honey Pots for Sale" for more details). You can sweeten a honey pot's lure by presenting real Web material (if the honey pot runs as a Web server), and using a sampling of legitimate accounts (but not passwords!) to populate the user database of the honey-pot system."

Read this full article at NetworkComputing

Only registered users can write comments.
Please login or register.

Powered by AkoComment!