Skip to main navigation Skip to search Skip to main content

Should we share honeypot information for security management?

  • Felix Wu
  • , Marc Dacier
  • , Herve Debar
  • , Yao Min Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?

Original languageEnglish
Title of host publication2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
Pages778
Number of pages1
DOIs
Publication statusPublished - 2005
Event2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005 - Nice, France
Duration: 2005 May 152005 May 19

Publication series

Name2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
Volume2005

Conference

Conference2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
Country/TerritoryFrance
CityNice
Period05-05-1505-05-19

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Should we share honeypot information for security management?'. Together they form a unique fingerprint.

Cite this