TY - GEN
T1 - Should we share honeypot information for security management?
AU - Wu, Felix
AU - Dacier, Marc
AU - Debar, Herve
AU - Chen, Yao Min
N1 - Generated from Scopus record by KAUST IRTS on 2022-09-12
PY - 2005/12/1
Y1 - 2005/12/1
N2 - It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?
AB - It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?
UR - https://ieeexplore.ieee.org/document/1440853/
UR - http://www.scopus.com/inward/record.url?scp=33744473784&partnerID=8YFLogxK
U2 - 10.1109/INM.2005.1440853
DO - 10.1109/INM.2005.1440853
M3 - Conference contribution
SN - 0780390873
BT - 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
ER -