security - How to implement a Honeypot? -
i want implement honey pot in our lab. part of work in our institution. need help , suggestion same.
"a server configured observe intruder mirroring real production system. appears ordinary server doing work, info , transactions phony. located either in or outside firewall, honeypot used larn intruder's techniques determine vulnerabilities in real system"
in practice, honeypots computers masquerade unprotected. honeypot records actions , interactions users. since honeypots don't provide legitimate services, activity unauthorized (and perchance malicious). talabis presents honeypots beingness analogous utilize of wet cement detecting human intruders
http://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/index.html
this pdf white paper gives detail how can implemented.. http://www.tracking-hackers.com/conf/slides/implementing.pdf
security honeypot
No comments:
Post a Comment