2009 Third International Conference on Network and System Security 2009
DOI: 10.1109/nss.2009.65
|View full text |Cite
|
Sign up to set email alerts
|

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing

Abstract: Abstract-Honeypots are valuable tools for detecting and analyzing malicious activity on the Internet. Successful and time-critical detection of such activity often depends on large-scale deployment. However, commercial organizations usually do not share honeypot data, and large, open honeypot initiatives only provide read-only alert feeds. As a result, while large and resourceful organizations can afford the high cost of this technology, smaller security firms and security researchers are fundamentally constra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Honeylab [42] provides a platform to share IP address space and computing resources. It is a distributed infrastructure overlay that allows security researchers to create their own desired honeypot systems without setting up distributed sensors in various geographical locations.…”
Section: A Features Of Decoymentioning
confidence: 99%
“…Honeylab [42] provides a platform to share IP address space and computing resources. It is a distributed infrastructure overlay that allows security researchers to create their own desired honeypot systems without setting up distributed sensors in various geographical locations.…”
Section: A Features Of Decoymentioning
confidence: 99%
“…[3] outline some requirements for deploying and managing virtual honeynets. Based on their paper, we discuss each requirement.…”
Section: Advantages and Limitations Of Proposed Systemmentioning
confidence: 99%
“…It is an information resource that is designed to be scanned, attacked and compromised 2,5 . By default, a honeypot should have no interaction activities towards it.…”
Section: Honeypot Background Definitionmentioning
confidence: 99%