Honeypots: Practical means to validate malicious fault assumptions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.

Original languageEnglish
Title of host publicationProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing
Pages383-388
Number of pages6
DOIs
Publication statusPublished - 15 Jun 2004
Externally publishedYes
EventProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing - Papeete Tahiti, French Polynesia
Duration: 3 Mar 20045 Mar 2004

Publication series

NameProceedings - IEEE Pacific Rim International Symposium on Dependable Computing

Conference

ConferenceProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing
Country/TerritoryFrench Polynesia
CityPapeete Tahiti
Period3/03/045/03/04

Fingerprint

Dive into the research topics of 'Honeypots: Practical means to validate malicious fault assumptions'. Together they form a unique fingerprint.

Cite this