scispace - formally typeset
Open AccessBook

Honeypots: Tracking Hackers

L. Spitzner
TLDR
Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology, and gains an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment.
Abstract
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive SystemsHoneypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks. 0321108957B08282002

read more

Citations
More filters
Proceedings Article

A virtual honeypot framework

TL;DR: Honeyd is presented, a framework for virtual honeypots that simulates virtual computer systems at the network level and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.
Journal ArticleDOI

Honeycomb: creating intrusion detection signatures using honeypots

TL;DR: A system for automated generation of attack signatures for network intrusion detection systems that successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.
Proceedings Article

Scalable, behavior-based malware clustering

Ulrich Bayer
TL;DR: Recent researchers have started to explore automated clustering techniques that help to identify samples that exhibit similar behavior, which allows an analyst to discard reports of samples that have been seen before, while focusing on novel, interesting threats.
Proceedings ArticleDOI

These aren't the droids you're looking for: retrofitting android to protect data from imperious applications

TL;DR: Two privacy controls for Android smartphones that empower users to run permission-hungry applications while protecting private data from being exfiltrated are examined, finding that they can successfully reduce the effective permissions of the application without causing side effects for 66% of the tested applications.
Journal ArticleDOI

The Honeynet Project: trapping the hackers

TL;DR: The Honeynet Project gathers information by deploying networks that are designed to be compromised, and studies the bad guys and shares the lessons learned.
References
More filters
Book

TCP/IP Illustrated Vol 1 The Protocols

TL;DR: TCP/IP Illustrated, Volume 1 is a complete and detailed guide to the entire TCP/IP protocol suite - with an important difference from other books on the subject: rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.

Simple Mail Transfer Protocol

Jon Postel
TL;DR: The objective of SMTP is to transfer mail reliably and efficiently and requires only a reliable ordered data stream channel.

File Transfer Protocol

J. Postel, +1 more
TL;DR: The following new optional commands are included in this edition of the FTP specification: Change to Parent Directory (CDUP), Structure Mount (SMNT), Store Unique (STOU), Remove Directory (RMD), Make Directory (MKD), Print Directory (PWD), and System (SYST).
Patent

Text to speech

TL;DR: In this article, a method for converting text to speech using a computing device having a memory is described, which comprises examining a text to be spoken to an audience for a specific communications purpose, followed by marking-up the text according to a phonetic markup system such as the Lessac System pronunciation rules notations.

An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied

Bill Cheswick
TL;DR: A chronicle of the cracker’s “successes” and disappointments, the bait and traps used to lure and detect him, and the chroot “Jail” the authors built to watch his activities.