Sunday, 15 May 2011

security - How to implement a Honeypot? -



security - How to implement a Honeypot? -

i want implement honey pot in our lab. part of work in our institution. need help , suggestion same.

"a server configured observe intruder mirroring real production system. appears ordinary server doing work, info , transactions phony. located either in or outside firewall, honeypot used larn intruder's techniques determine vulnerabilities in real system"

in practice, honeypots computers masquerade unprotected. honeypot records actions , interactions users. since honeypots don't provide legitimate services, activity unauthorized (and perchance malicious). talabis presents honeypots beingness analogous utilize of wet cement detecting human intruders

http://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/index.html

this pdf white paper gives detail how can implemented.. http://www.tracking-hackers.com/conf/slides/implementing.pdf

security honeypot

No comments:

Post a Comment