Cargando…

Honeypot Resurrection - Redesign of CERN's Security Honeypots

Honeypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is dep...

Descripción completa

Detalles Bibliográficos
Autor principal: Buschendorf, Fabiola
Lenguaje:eng
Publicado: 2018
Acceso en línea:http://cds.cern.ch/record/2633718
_version_ 1780959650370289664
author Buschendorf, Fabiola
author_facet Buschendorf, Fabiola
author_sort Buschendorf, Fabiola
collection CERN
description Honeypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is deprecated and does not provide useful notifications. The task of this summer student project is to identify well maintained and up-to-date open source honeypots, test and configure them and finally deploy them to convincingly resemble a CERN host in order to collect information about potentially malicious activity inside the GPN.
id cern-2633718
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2018
record_format invenio
spelling cern-26337182019-09-30T06:29:59Zhttp://cds.cern.ch/record/2633718engBuschendorf, FabiolaHoneypot Resurrection - Redesign of CERN's Security HoneypotsHoneypots are a fake system residing in a companie's or organization's network, attracting attackers by emulating old and vulnerable software. If a Honeypot is accessed, all actions are logged and any submitted files are being stored on the host machine. The current Honeypot at CERN is deprecated and does not provide useful notifications. The task of this summer student project is to identify well maintained and up-to-date open source honeypots, test and configure them and finally deploy them to convincingly resemble a CERN host in order to collect information about potentially malicious activity inside the GPN.Poster-2018-653oai:cds.cern.ch:26337182018-07-31
spellingShingle Buschendorf, Fabiola
Honeypot Resurrection - Redesign of CERN's Security Honeypots
title Honeypot Resurrection - Redesign of CERN's Security Honeypots
title_full Honeypot Resurrection - Redesign of CERN's Security Honeypots
title_fullStr Honeypot Resurrection - Redesign of CERN's Security Honeypots
title_full_unstemmed Honeypot Resurrection - Redesign of CERN's Security Honeypots
title_short Honeypot Resurrection - Redesign of CERN's Security Honeypots
title_sort honeypot resurrection - redesign of cern's security honeypots
url http://cds.cern.ch/record/2633718
work_keys_str_mv AT buschendorffabiola honeypotresurrectionredesignofcernssecurityhoneypots