Implementation and Attacks Analysis of a Honeypot

This paper describes the deployment of a honeypot by configuring a unique machine as part of the Distributed Honeypots Project. This work presents all the tools needed to implement the honeypot environment, as well as the configuration itself. Afterwards, the collected data and the attacks analysis are presented. At the end, final statements are made and future works are suggested.

[1]  SpitznerLance The Honeynet Project , 2003, S&P 2003.