Risk assessment of production networks using honeynets - Some practical experience

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Threats for today's production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to properly define and dimension appropriate security architectures and policies for a network, the possible threats have to be identified and assessed both in terms of their impact on the resources to be protected and with respect to the probability and frequency of related attacks. To support this assessment, honeynets, i.e. artificial networks set up specifically to monitor, log and evaluate attack activities, have been proposed. In this paper, experiences and results gained with setting up, deploying and operating such a honeynet are reported together with some comments on the effectiveness of this approach. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Riebach, S., Rathgeb, E. P., & Toedtmann, B. (2005). Risk assessment of production networks using honeynets - Some practical experience. In Lecture Notes in Computer Science (Vol. 3439, pp. 1–12). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free