Visible to the public Biblio

Filters: Author is Harrison, K.  [Clear All Filters]
2017-03-08
Harrison, K., Rutherford, J. R., White, G. B..  2015.  The Honey Community: Use of Combined Organizational Data for Community Protection. 2015 48th Hawaii International Conference on System Sciences. :2288–2297.

The United States has US CYBERCOM to protect the US Military Infrastructure and DHS to protect the nation's critical cyber infrastructure. These organizations deal with wide ranging issues at a national level. This leaves local and state governments to largely fend for themselves in the cyber frontier. This paper will focus on how to determine the threat to a community and what indications and warnings can lead us to suspect an attack is underway. To try and help answer these questions we utilized the concepts of Honey pots and Honey nets and extended them to a multi-organization concept within a geographic boundary to form a Honey Community. The initial phase of the research done in support of this paper was to create a fictitious community with various components to entice would-be attackers and determine if the use of multiple sectors in a community would aid in the determination of an attack.