Development and implementation of a honeynet on a university-owned subnet
Loading...
Authors
Johnson, Erin L.
Koenig, John M.
Advisors
License
DOI
Type
Presentation
Journal Title
Journal ISSN
Volume Title
Publisher
Grantor
Abstract
Computer security experts often focus on understanding and improving defensive practices, in an attempt to stem the flow of attacks on computer systems. However, a purely defensive approach does not make use of additional information gained by studying attackers and their mindsets as well as the results of attacker methodologies. Honeypot technology utilizes computers whose sole purpose is to be attacked so the tools, techniques, and modus operandi of computer system attackers can be studied. A honeynet is a collection of honeypot systems set up in an isolated network domain to better ensure that all network traffic is generated by attackers. Our project was to implement a honeynet with limited resources in such a way as to not endanger the University of Wisconsin--Eau Claire (UWEC) network. We have now successfully configured a honeynet in the UWEC network environment, and we are collecting data to help in a nationwide project to better understand and respond to computer system attacks.
Description
Color poster with text and diagrams describing research conducted by Erin L. Johnson and John M. Koenig advised by Paul J. Wagner.
Related Material and Data
Citation
Sponsorship
University of Wisconsin--Eau Claire Office of Research and Sponsored Programs.