Lessons Learned from the deployment of a high-interaction honeypot
Abstract
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of lowinteraction honeypots.
- Publication:
-
arXiv e-prints
- Pub Date:
- April 2007
- DOI:
- 10.48550/arXiv.0704.0858
- arXiv:
- arXiv:0704.0858
- Bibcode:
- 2007arXiv0704.0858A
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44