• DocumentCode
    2803433
  • Title

    IT security education is enhanced by analyzing Honeynet data

  • Author

    Romney, Gordon W. ; Jones, Jeremiah K. ; Rogers, Brandon L. ; MacCabe, Philip

  • Author_Institution
    Inf. Technol., Brigham Young Univ., Provo, UT, USA
  • fYear
    2005
  • fDate
    7-9 July 2005
  • Abstract
    Honeynets have increasingly been deployed by information technology (IT) professionals in industry for studying the methods and tools of malicious attackers. Educational institutions, because of their open access, offer a particularly enticing setting for connecting a Honeynet. The specific challenge for educational institutions is maintaining continuity in Honeynet research and operation as both undergraduate and graduate students complete their studies and leave. Furthermore, the analysis of Honeynet data requires a broad spectrum of security experience and skills. In this research, students installed an anonymous generation II Honeynet in the IT Security Lab at Brigham Young University (BYU) to assist in their educational experience in information assurance and security (IAS). The lab provides a secure setting for students to configure and monitor a honey wall connected to the Internet with its networked Windows and Linux honeypots. The objective of this research was to enhance undergraduate security training by 1) determining the impact of a Honeynet upon BYU security best practices, 2) assisting students to conduct personal research on the BYU Honeynet, and 3) providing live vulnerability training.
  • Keywords
    Internet; computer crime; educational institutions; educational technology; BYU Honeynet; BYU security best practice; IT security education; Internet vulnerability; Linux; educational institution; generation II Honeynet; information assurance; information security; information technology; undergraduate security education; undergraduate security training; vulnerability training; Best practices; Data analysis; Data security; Educational institutions; IP networks; Information security; Information technology; Joining processes; Linux; Monitoring; Best Practices; Honeynet; IAS; Internet vulnerabilities; hacker; honeypot; honeywall; undergraduate security education;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology Based Higher Education and Training, 2005. ITHET 2005. 6th International Conference on
  • Print_ISBN
    0-7803-9141-1
  • Type

    conf

  • DOI
    10.1109/ITHET.2005.1560297
  • Filename
    1560297