Cargando…
Honeypot Resurrection - Redesign of CERN's Security Honeypots
Honeypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is dep...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2018
|
Acceso en línea: | http://cds.cern.ch/record/2633718 |
_version_ | 1780959650370289664 |
---|---|
author | Buschendorf, Fabiola |
author_facet | Buschendorf, Fabiola |
author_sort | Buschendorf, Fabiola |
collection | CERN |
description | Honeypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is deprecated and does not provide useful notifications. The task of this summer student project is to identify well maintained and up-to-date open source honeypots, test and configure them and finally deploy them to convincingly resemble a CERN host in order to collect information about potentially malicious activity inside the GPN. |
id | cern-2633718 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2018 |
record_format | invenio |
spelling | cern-26337182019-09-30T06:29:59Zhttp://cds.cern.ch/record/2633718engBuschendorf, FabiolaHoneypot Resurrection - Redesign of CERN's Security HoneypotsHoneypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is deprecated and does not provide useful notifications. The task of this summer student project is to identify well maintained and up-to-date open source honeypots, test and configure them and finally deploy them to convincingly resemble a CERN host in order to collect information about potentially malicious activity inside the GPN.Poster-2018-653oai:cds.cern.ch:26337182018-07-31 |
spellingShingle | Buschendorf, Fabiola Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title | Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title_full | Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title_fullStr | Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title_full_unstemmed | Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title_short | Honeypot Resurrection - Redesign of CERN's Security Honeypots |
title_sort | honeypot resurrection - redesign of cern's security honeypots |
url | http://cds.cern.ch/record/2633718 |
work_keys_str_mv | AT buschendorffabiola honeypotresurrectionredesignofcernssecurityhoneypots |