@inproceedings{a8fb05cb99fa4846924056863c085e28,
title = "Honeypots: Practical means to validate malicious fault assumptions",
abstract = "In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.",
author = "Marc Dacier and Fabien Pouget and Herv{\'e} Debar",
year = "2004",
month = jun,
day = "15",
doi = "10.1109/PRDC.2004.1276594",
language = "English",
isbn = "0769520766",
series = "Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing",
pages = "383--388",
booktitle = "Proceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing",
note = "Proceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing ; Conference date: 03-03-2004 Through 05-03-2004",
}