6533b7dbfe1ef96bd126fe61

RESEARCH PRODUCT

Honeypot utilization for analyzing cyber attacks

Simo KemppainenOtto Hrad

subject

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHacker

description

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

https://doi.org/10.1145/2993412.2993415