Honeypots: Practical means to validate malicious fault assumptions

Marc Dacier, Fabien Pouget, Hervé Debar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Abstract

In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.
Original languageEnglish (US)
Title of host publicationProceedings - IEEE Pacific Rim International Symposium on Dependable Computing
Pages383-388
Number of pages6
DOIs
StatePublished - Jun 15 2004
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2022-09-12

Fingerprint

Dive into the research topics of 'Honeypots: Practical means to validate malicious fault assumptions'. Together they form a unique fingerprint.

Cite this