Security

An Advanced Honeypot System for Efficient Capture and Analysis of Network Attack Traffic

Free registration required

Executive Summary

A honeypot is an information system resource used to divert attackers and hackers away from critical resources as well as a tool to study an attacker's methods. One of the most widely used tools is honeyd for creating honeypots. The logs generated by honeyd can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed by security analysts as they consume a lot of time and resources.

  • Format: PDF
  • Size: 426.4 KB