- 0
- 0
- 约3千字
- 约 22页
- 2016-08-22 发布于河南
- 举报
Honeypot An instrument for attracting and detecting attackers
HoneypotAn instrument for attractingand detecting attackers April 2002, R. Baumann me@ Agenda Theory Implementation Administrations Toolkit Attacks Conclusion TheoryHoneypot Term originally from the military Fake target or ambush In this presentation, the term ?honeypot“ is used in network security environment TheoryDefinition TheoryBenefit Productive environment:distraction from the real targets Research environment:information gathering but: No direct protection gained In difference to IDS: no false alerts TheoryTypes of implementation Level of Involvement Low Involvement: Port
原创力文档

文档评论(0)