Visible to the public Honeypot Utilization for Analyzing Cyber Attacks

TitleHoneypot Utilization for Analyzing Cyber Attacks
Publication TypeConference Paper
Year of Publication2016
AuthorsHrad, Otto, Kemppainen, Simo
Conference NameProccedings of the 10th European Conference on Software Architecture Workshops
Date PublishedNovember 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4781-5
KeywordsHacking, honey pots, Human Behavior, Information security, network attacks, pubcrawl, Resiliency, Scalability, security breach
Abstract

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

URLhttps://dl.acm.org/doi/10.1145/2993412.2993415
DOI10.1145/2993412.2993415
Citation Keyhrad_honeypot_2016