Should we share honeypot information for security management?

Felix Wu, Marc Dacier, Herve Debar, Yao Min Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?

Original languageEnglish
Title of host publication2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
Pages778
Number of pages1
Volume2005
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005 - Nice
Duration: 15 May 200519 May 2005

Other

Other2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
CityNice
Period15/5/0519/5/05

Fingerprint

Internet

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Wu, F., Dacier, M., Debar, H., & Chen, Y. M. (2005). Should we share honeypot information for security management? In 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005 (Vol. 2005, pp. 778). [1440853] https://doi.org/10.1109/INM.2005.1440853

Should we share honeypot information for security management? / Wu, Felix; Dacier, Marc; Debar, Herve; Chen, Yao Min.

2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. Vol. 2005 2005. p. 778 1440853.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wu, F, Dacier, M, Debar, H & Chen, YM 2005, Should we share honeypot information for security management? in 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. vol. 2005, 1440853, pp. 778, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005, Nice, 15/5/05. https://doi.org/10.1109/INM.2005.1440853
Wu F, Dacier M, Debar H, Chen YM. Should we share honeypot information for security management? In 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. Vol. 2005. 2005. p. 778. 1440853 https://doi.org/10.1109/INM.2005.1440853
Wu, Felix ; Dacier, Marc ; Debar, Herve ; Chen, Yao Min. / Should we share honeypot information for security management?. 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005. Vol. 2005 2005. pp. 778
@inproceedings{ed87ae918368469aba0f4c5d969cc5d2,
title = "Should we share honeypot information for security management?",
abstract = "It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the {"}honeypot{"}, a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?",
author = "Felix Wu and Marc Dacier and Herve Debar and Chen, {Yao Min}",
year = "2005",
doi = "10.1109/INM.2005.1440853",
language = "English",
isbn = "0780390873",
volume = "2005",
pages = "778",
booktitle = "2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005",

}

TY - GEN

T1 - Should we share honeypot information for security management?

AU - Wu, Felix

AU - Dacier, Marc

AU - Debar, Herve

AU - Chen, Yao Min

PY - 2005

Y1 - 2005

N2 - It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?

AB - It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?

UR - http://www.scopus.com/inward/record.url?scp=33744473784&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744473784&partnerID=8YFLogxK

U2 - 10.1109/INM.2005.1440853

DO - 10.1109/INM.2005.1440853

M3 - Conference contribution

SN - 0780390873

SN - 9780780390874

VL - 2005

SP - 778

BT - 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005

ER -