Should we share honeypot information for security management?

Felix Wu, Marc Dacier, Herve Debar, Yao Min Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?
Original languageEnglish (US)
Title of host publication2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
DOIs
StatePublished - Dec 1 2005
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2022-09-12

Fingerprint

Dive into the research topics of 'Should we share honeypot information for security management?'. Together they form a unique fingerprint.

Cite this