Show simple item record

A Virtual Honeypot Framework

dc.contributor.authorProvos, Nielsen_US
dc.date.accessioned2014-07-18T18:11:46Z
dc.date.available2014-07-18T18:11:46Z
dc.date.issued2003-10-21en_US
dc.identifier.citationNiels Provos, "A Virtual Honeypot Framework," October 2003. [13th USENIX Security Symposium, San Diego, CA (August 2004).] <http://hdl.handle.net/2027.42/107882>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107882
dc.description.abstractA honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypots that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addresses. To deceive network fingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary routing topologies and services for an arbitrary number of virtual systems. This paper discusses Honeyd's design and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titleA Virtual Honeypot Frameworken_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationumCenter for Information Technology Integrationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107882/1/citi-tr-03-1.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.