Deceptive Honeypots

Contributed by Suen Yek and Craig Valli

This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet