honeypots

Book review: Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos, Thorsten Holz

Honeypots look like victim systems waiting or searching for malware and other nefarious attacks, registering the enemy's practices in high-resolution gory, blood-ridden detail. Virtualization allows one system to act as a network of disparate victim OS’s and services. Security experts can observe attacks live or stored for detailed analysis, learn the methodology of Dr Evil and generate statistics for internet wide attacks.

Subscribe to RSS - honeypots