TY - GEN
T1 - Honeypots: Practical means to validate malicious fault assumptions
AU - Dacier, Marc
AU - Pouget, Fabien
AU - Debar, Hervé
N1 - Generated from Scopus record by KAUST IRTS on 2022-09-12
PY - 2004/6/15
Y1 - 2004/6/15
N2 - In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.
AB - In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.
UR - http://ieeexplore.ieee.org/document/1276594/
UR - http://www.scopus.com/inward/record.url?scp=2642562805&partnerID=8YFLogxK
U2 - 10.1109/PRDC.2004.1276594
DO - 10.1109/PRDC.2004.1276594
M3 - Conference contribution
SN - 0769520766
SP - 383
EP - 388
BT - Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing
ER -