Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses

This paper deals with the basic aspects of Honeypot s, their use in modern computer networks and their implementation in educational environments. I nitially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. N ext, the paper explains the different types and functions of Honeypots once they are implemented in a network in order to make a distinction in terms of what is needed for the Honeypot to do. Fin ally, the use of Honeypots in educational environments, its benefits and the use of virtualizat ion technologies is discussed.

[1]  Carlos Francisco Lerma,et al.  Creating Learning Objects , 2007 .

[2]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[3]  William Cheswick An evening with Berferd , 1997 .

[4]  David Collins Using VMWare and live CD's to configure a secure, flexible, easy to manage computer lab environment , 2006 .

[5]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[6]  Thorsten Holz,et al.  A Pointillist Approach for Comparing Honeypots , 2005, DIMVA.

[7]  Marc Dacier,et al.  Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots , 2006, RAID.

[8]  Charles Border The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes , 2007, SIGCSE '07.

[9]  David Wiley,et al.  Connecting learning objects to instructional design theory: A definition, a metaphor, and a taxonomy , 2000 .

[10]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[11]  Christopher Kruegel,et al.  Intrusion and Malware Detection and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science) , 2005 .

[12]  Birger Tödtmann,et al.  Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet , 2005, NETWORKING.

[13]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .