Skip to main content
Article
Honeypots: How do you know when you're inside one?
ECU Publications Pre. 2011
  • Simon Innes, Edith Cowan University
  • Craig Valli, Edith Cowan University
Publication Date
1-1-2006
Document Type
Conference Proceeding
Publisher
Edith Cowan University
Faculty
Computing, Health and Science
School
Computer and Information Science, Centre for Security Research
RAS ID
5080
Comments

This article was originally published as: Innes, S. , & Valli, C. (2006). Honeypots: How do you know when you're inside one?. Proceedings of Australian Digital Forensics Conference. (pp. 78-83). Edith Cowan University, Perth, Australia. Edith Cowan University. Original article available here

Abstract

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified

Disciplines
Citation Information
Simon Innes and Craig Valli. "Honeypots: How do you know when you're inside one?" (2006)
Available at: http://works.bepress.com/craig_valli/49/