Open Source Honeypots, Part Two: Deploying Honeyd in the Wild
By Lance Spitzner

This is the second part of a three-part series looking at Honeyd, the open
source honeypot. In this paper we we will deploy Honeyd on the Internet
for one week and watch what happens. The intent is to test Honeyd by
letting real bad guys interact with and attack it. We will then analyze
how the honeypot performed and what it discovered.

http://www.securityfocus.com/infocus/1675

Stephen Entwisle
Moderator, Security-Basics
SecurityFocus
http://www.securityfocus.com
(403) 213 3939 ext. 235

Reply via email to