Development and implementation of a honeynet on a university-owned subnet
Date
2007-05-01Author
Johnson, Erin L.
Koenig, John M.
Advisor(s)
Wagner, Paul J.
Metadata
Show full item recordAbstract
Computer security experts often focus on understanding and improving defensive practices, in an attempt to stem the flow of attacks on computer systems. However, a purely defensive approach does not make use of additional information gained by studying attackers and their mindsets as well as the results of attacker methodologies. Honeypot technology utilizes computers whose sole purpose is to be attacked so the tools, techniques, and modus operandi of computer system attackers can be studied. A honeynet is a collection of honeypot systems set up in an isolated network domain to better ensure that all network traffic is generated by attackers. Our project was to implement a honeynet with limited resources in such a way as to not endanger the University of Wisconsin--Eau Claire (UWEC) network. We have now successfully configured a honeynet in the UWEC network environment, and we are collecting data to help in a nationwide project to better understand and respond to computer system attacks.
Subject
Computer security
Computer networks--Security measures
Computer hackers
Virtual computer systems--Security measures
Posters
Permanent Link
http://digital.library.wisc.edu/1793/23213Description
Color poster with text and diagrams describing research conducted by Erin L. Johnson and John M. Koenig advised by Paul J. Wagner.