Skip to main content
Article
Honeypots: How do you know when you are inside one?
Australian Digital Forensics Conference
  • Simon Innes, Edith Cowan University
  • Craig Valli, Edith Cowan University
Publication Date
4-12-2006
Document Type
Conference Proceeding
Publisher
School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Abstract

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified

Comments

Originally published in the Proceedings of the 4th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 4th 2006.

Disciplines
Citation Information
Simon Innes and Craig Valli. "Honeypots: How do you know when you are inside one?" (2006)
Available at: http://works.bepress.com/craig_valli/6/