Cargando…

Honeypot Resurrection - Redesign of CERN’s Security Honeypots

This summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services,...

Descripción completa

Detalles Bibliográficos
Autor principal: Buschendorf, Fabiola
Lenguaje:eng
Publicado: 2018
Materias:
Acceso en línea:http://cds.cern.ch/record/2639797
_version_ 1780960114696519680
author Buschendorf, Fabiola
author_facet Buschendorf, Fabiola
author_sort Buschendorf, Fabiola
collection CERN
description This summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services, such as SSH, Telnet or SMB and allows connections as well as interactions with the fake service. In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries.
id cern-2639797
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2018
record_format invenio
spelling cern-26397972019-09-30T06:29:59Zhttp://cds.cern.ch/record/2639797engBuschendorf, FabiolaHoneypot Resurrection - Redesign of CERN’s Security HoneypotsComputing and ComputersThis summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services, such as SSH, Telnet or SMB and allows connections as well as interactions with the fake service. In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries.CERN-STUDENTS-Note-2018-151oai:cds.cern.ch:26397972018-09-21
spellingShingle Computing and Computers
Buschendorf, Fabiola
Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title_full Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title_fullStr Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title_full_unstemmed Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title_short Honeypot Resurrection - Redesign of CERN’s Security Honeypots
title_sort honeypot resurrection - redesign of cern’s security honeypots
topic Computing and Computers
url http://cds.cern.ch/record/2639797
work_keys_str_mv AT buschendorffabiola honeypotresurrectionredesignofcernssecurityhoneypots