Cargando…
Honeypot Resurrection - Redesign of CERN’s Security Honeypots
This summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services,...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2018
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2639797 |
_version_ | 1780960114696519680 |
---|---|
author | Buschendorf, Fabiola |
author_facet | Buschendorf, Fabiola |
author_sort | Buschendorf, Fabiola |
collection | CERN |
description | This summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services, such as SSH, Telnet or SMB and allows connections as well as interactions with the fake service. In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries. |
id | cern-2639797 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2018 |
record_format | invenio |
spelling | cern-26397972019-09-30T06:29:59Zhttp://cds.cern.ch/record/2639797engBuschendorf, FabiolaHoneypot Resurrection - Redesign of CERN’s Security HoneypotsComputing and ComputersThis summer student’s project is about implementing an updated and improved honeypot solution as part of CERN’s computer network protection. A honeypot simulates a vulnerable computer system, traps an attacker and collects attack information. It does this by exposing seemingly un- patched services, such as SSH, Telnet or SMB and allows connections as well as interactions with the fake service. In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries.CERN-STUDENTS-Note-2018-151oai:cds.cern.ch:26397972018-09-21 |
spellingShingle | Computing and Computers Buschendorf, Fabiola Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title | Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title_full | Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title_fullStr | Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title_full_unstemmed | Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title_short | Honeypot Resurrection - Redesign of CERN’s Security Honeypots |
title_sort | honeypot resurrection - redesign of cern’s security honeypots |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2639797 |
work_keys_str_mv | AT buschendorffabiola honeypotresurrectionredesignofcernssecurityhoneypots |