Jump to ContentJump to Main Navigation
Show Summary Details
More options …

PIK - Praxis der Informationsverarbeitung und Kommunikation

Fachzeitschrift für den Einsatz von Informationssystemen

Ed. by Müller, Paul

Online
ISSN
1865-8342
See all formats and pricing
More options …
Volume 27, Issue 4 (Jan 2004)

Issues

Vulnerability Assessment using Honeypots

M. Dornseif / F. C. Gärtner / T. Holz
Published Online: 2007-12-14 | DOI: https://doi.org/10.1515/PIKO.2004.195

ABSTRACT

Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data collected through them, honeynets are considered a useful tool to learn more about attack patterns and attacker behavior in real networks. This paper explains the motivation for using the honeynet methodology and describes experiences with a honeynet at RWTH Aachen University. In analyzing the data collected through our experiment, we discuss the value of honeynets for computer vulnerability assessment. The paper also gives an overview over ethical and legal aspects of honeypots and a look on possible directions for further research.

About the article

Published Online: 2007-12-14

Published in Print: 2004-12-01


Citation Information: Praxis der Informationsverarbeitung und Kommunikation, ISSN (Print) 0930-5157, DOI: https://doi.org/10.1515/PIKO.2004.195.

Export Citation

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Pavol Sokol, Jakub Míšek, and Martin Husák
EURASIP Journal on Information Security, 2017, Volume 2017, Number 1

Comments (0)

Please log in or register to comment.
Log in