Threats for today's production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to properly define and dimension appropriate security architectures and policies for a network, the possible threats have to be identified and assessed both in terms of their impact on the resources to be protected and with respect to the probability and frequency of related attacks. To support this assessment, honeynets, i.e. artificial networks set up specifically to monitor, log and evaluate attack activities, have been proposed. In this paper, experiences and results gained with setting up, deploying and operating such a honeynet are reported together with some comments on the effectiveness of this approach. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Riebach, S., Rathgeb, E. P., & Toedtmann, B. (2005). Risk assessment of production networks using honeynets - Some practical experience. In Lecture Notes in Computer Science (Vol. 3439, pp. 1–12). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_1
Mendeley helps you to discover research relevant for your work.