Lessons learned from the deployment of a high-interaction honeypot

E. Alata, V. Nicomette, M. Kaâniche, Marc Dacier, M. Herrb

Research output: Chapter in Book/Report/Conference proceedingConference contribution

49 Citations (Scopus)

Abstract

This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots.

Original languageEnglish
Title of host publicationProceedings - Sixth European Dependable Computing Conference, EDCC 2006
Pages39-44
Number of pages6
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event6th European Dependable Computing Conference, EDCC 2006 - Coimbra
Duration: 18 Oct 200620 Oct 2006

Other

Other6th European Dependable Computing Conference, EDCC 2006
CityCoimbra
Period18/10/0620/10/06

Fingerprint

Experiments

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Cite this

Alata, E., Nicomette, V., Kaâniche, M., Dacier, M., & Herrb, M. (2006). Lessons learned from the deployment of a high-interaction honeypot. In Proceedings - Sixth European Dependable Computing Conference, EDCC 2006 (pp. 39-44). [4020829] https://doi.org/10.1109/EDCC.2006.17

Lessons learned from the deployment of a high-interaction honeypot. / Alata, E.; Nicomette, V.; Kaâniche, M.; Dacier, Marc; Herrb, M.

Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. 2006. p. 39-44 4020829.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alata, E, Nicomette, V, Kaâniche, M, Dacier, M & Herrb, M 2006, Lessons learned from the deployment of a high-interaction honeypot. in Proceedings - Sixth European Dependable Computing Conference, EDCC 2006., 4020829, pp. 39-44, 6th European Dependable Computing Conference, EDCC 2006, Coimbra, 18/10/06. https://doi.org/10.1109/EDCC.2006.17
Alata E, Nicomette V, Kaâniche M, Dacier M, Herrb M. Lessons learned from the deployment of a high-interaction honeypot. In Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. 2006. p. 39-44. 4020829 https://doi.org/10.1109/EDCC.2006.17
Alata, E. ; Nicomette, V. ; Kaâniche, M. ; Dacier, Marc ; Herrb, M. / Lessons learned from the deployment of a high-interaction honeypot. Proceedings - Sixth European Dependable Computing Conference, EDCC 2006. 2006. pp. 39-44
@inproceedings{922a2d6c02294c61ad58b877d4848300,
title = "Lessons learned from the deployment of a high-interaction honeypot",
abstract = "This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots.",
author = "E. Alata and V. Nicomette and M. Ka{\^a}niche and Marc Dacier and M. Herrb",
year = "2006",
doi = "10.1109/EDCC.2006.17",
language = "English",
isbn = "0769526489",
pages = "39--44",
booktitle = "Proceedings - Sixth European Dependable Computing Conference, EDCC 2006",

}

TY - GEN

T1 - Lessons learned from the deployment of a high-interaction honeypot

AU - Alata, E.

AU - Nicomette, V.

AU - Kaâniche, M.

AU - Dacier, Marc

AU - Herrb, M.

PY - 2006

Y1 - 2006

N2 - This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots.

AB - This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots.

UR - http://www.scopus.com/inward/record.url?scp=34547491379&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34547491379&partnerID=8YFLogxK

U2 - 10.1109/EDCC.2006.17

DO - 10.1109/EDCC.2006.17

M3 - Conference contribution

SN - 0769526489

SN - 9780769526485

SP - 39

EP - 44

BT - Proceedings - Sixth European Dependable Computing Conference, EDCC 2006

ER -