Honeypots

Honeypots: A New Paradigm to Information Security

Published:
Content:
Editor(s):
Free Standard Shipping

Purchasing Options

Hardback
ISBN 9781578087082
Cat# N10355

$146.95

$117.56

SAVE 20%


Other eBook Options:
 

Summary

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Table of Contents

Honeypots
Background
Honeypots
Honeypots vs. Firewalls and Intrusion
Classification of Honeypots
Placement of Honeypots
Varieties of Honeypots: Honey tokens, Honeypages, Honeynets and Honeyfarms
Value of Honeypots
Risks and Tradeoffs
Key Issues and Challenges

Commercially Available Honeypots
Backofficer Friendly
Specter
Mantrap
Honeyd

Honeynets
Overview of Honeynets
Value of Honeynets
Working of Honeynet
Honeynet Architectures
Sweetening the Honeynets
Risks Associated with Honeynets

Attacks and Role of Honeypots
Phases of Attack and Honeypots
Worms and Virus Attacks
Spam and Phishing Mails
Distributed Denial of Service Attacks

Static Honeypots
Honeypot as Detection Systems
Honeypot as Deception Systems

Virtual Honeypots
Virtual Honeypot: VMware Workstation
Data Capture on Virtual Honeypots
Raw Disks and Virtual Disks
Virtual Honeynet
Case Study

Dynamic Honeypots
Issues with Static Honeypots
Dynamic Honeypots
Dynamic Honeypot Design
Dynamic Honeypot
Construction
Benefits

Wireless Honeypots
Introduction to Wireless Local Area Networks
Basic Wireless Concepts
Security
Wireless Attacks: From A
Blackhat’s perspective
Wireless Honeypots
Limitations

Applications of Honeypot
Defense against automated attacks
Protection against human intruders
Surgical Detection Methods
Cyber-Forensics
Network Surveillance
Forensic Analysis
Tactical Battlefield
Use as Deterrent
Research
Purpose

Anti Honeypot Technology
Network Issues
System Issues
Techniques for Honeypot Detection
Counter-measure for Detection of
Honeypot Deployment

Honeypots and Network Forensics
Network Forensics
Honeypot as Network Forensic Analysis Tools
Honeypot Based Network Forensics
Frameworks