DocumentCode :
2127017
Title :
A Pilot Study of Using Honeypots as Cyber Intelligence Sources
Author :
Bilstrup, Urban ; Rosenberg, Melanie
Author_Institution :
Sch. of Inf. Sci., Halmstad Univ., Halmstad, Sweden
fYear :
2013
fDate :
12-14 Aug. 2013
Firstpage :
224
Lastpage :
224
Abstract :
There will always be a security gap between our ability to secure our networks and the actual level of security needed. When securing our networks we need good intelligence to direct our efforts and focus on the right spots. We need to find those spots and they can be found, with the right tools. Survival time is a method that provides possibilities to make decisions concerning information security risks based on true knowledge and hard facts, in a repeatable and scientific manner. This presented work aim to investigate the possibility to use survival time of an unprotected system as an intelligence source and measure the current survival time for a given unprotected system. By the deployment of a decoy, an unprotected system, data is captured and collected through port monitoring. Mainly focus lie on building a time curve presenting the estimated time for an unprotected public system to get detected on the Internet and the elapsed time hence the system gets attacked.
Keywords :
Internet; computer network security; risk analysis; Internet; cyber intelligence sources; hard facts; honeypots; information security risks; port monitoring; security gap; survival time; true knowledge; unprotected public system; Computer hacking; Distributed databases; Educational institutions; Internet; Operating systems; Terrorism; Cyber Intelligence; Internet security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (EISIC), 2013 European
Conference_Location :
Uppsala
Type :
conf
DOI :
10.1109/EISIC.2013.56
Filename :
6657166
Link To Document :
بازگشت