Title :
IT security education is enhanced by analyzing Honeynet data
Author :
Romney, Gordon W. ; Jones, Jeremiah K. ; Rogers, Brandon L. ; MacCabe, Philip
Author_Institution :
Inf. Technol., Brigham Young Univ., Provo, UT, USA
Abstract :
Honeynets have increasingly been deployed by information technology (IT) professionals in industry for studying the methods and tools of malicious attackers. Educational institutions, because of their open access, offer a particularly enticing setting for connecting a Honeynet. The specific challenge for educational institutions is maintaining continuity in Honeynet research and operation as both undergraduate and graduate students complete their studies and leave. Furthermore, the analysis of Honeynet data requires a broad spectrum of security experience and skills. In this research, students installed an anonymous generation II Honeynet in the IT Security Lab at Brigham Young University (BYU) to assist in their educational experience in information assurance and security (IAS). The lab provides a secure setting for students to configure and monitor a honey wall connected to the Internet with its networked Windows and Linux honeypots. The objective of this research was to enhance undergraduate security training by 1) determining the impact of a Honeynet upon BYU security best practices, 2) assisting students to conduct personal research on the BYU Honeynet, and 3) providing live vulnerability training.
Keywords :
Internet; computer crime; educational institutions; educational technology; BYU Honeynet; BYU security best practice; IT security education; Internet vulnerability; Linux; educational institution; generation II Honeynet; information assurance; information security; information technology; undergraduate security education; undergraduate security training; vulnerability training; Best practices; Data analysis; Data security; Educational institutions; IP networks; Information security; Information technology; Joining processes; Linux; Monitoring; Best Practices; Honeynet; IAS; Internet vulnerabilities; hacker; honeypot; honeywall; undergraduate security education;
Conference_Titel :
Information Technology Based Higher Education and Training, 2005. ITHET 2005. 6th International Conference on
Print_ISBN :
0-7803-9141-1
DOI :
10.1109/ITHET.2005.1560297