A Virtual Honeypot Framework
dc.contributor.author | Provos, Niels | en_US |
dc.date.accessioned | 2014-07-18T18:11:46Z | |
dc.date.available | 2014-07-18T18:11:46Z | |
dc.date.issued | 2003-10-21 | en_US |
dc.identifier.citation | Niels Provos, "A Virtual Honeypot Framework," October 2003. [13th USENIX Security Symposium, San Diego, CA (August 2004).] <http://hdl.handle.net/2027.42/107882> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107882 | |
dc.description.abstract | A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypots that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addresses. To deceive network fingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary routing topologies and services for an arbitrary number of virtual systems. This paper discusses Honeyd's design and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | A Virtual Honeypot Framework | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107882/1/citi-tr-03-1.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.