Knowledge (XXG)

Honeynet Project

Source 📝

129: 63: 22: 493:
The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies. These computer production systems are added online and the network of volunteers scans the network for attacks or suspicious activity. The findings are published on the
485:
The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The group's research provides sensitive information regarding attackers. This includes their motives,
739: 486:
communication methods, attack timelines, and actions following a system attack. This information is provided through Know Your Enemy white papers, The Project blog posts, and Scan of the Month
415:
The Honeynet Project began in 1999 as a mailing list to a select few. The group expanded and officially dubbed itself as The Honeynet Project in June 2000.
729: 473:
Conduct research covering data analysis approaches unique security tool development, and gathering data about attackers and malicious software they use.
734: 679: 73: 719: 92: 230: 212: 146: 110: 49: 35: 724: 193: 165: 150: 601: 172: 88: 404: 179: 139: 161: 41: 508: 629: 683: 487: 476:
Provide the tools and techniques used by The Honeynet Project so other organizations can benefit.
330: 661:
About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
388: 186: 84: 583: 633: 541: 713: 503: 451: 625:
Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from
545: 396: 392: 128: 605: 587: 645:
Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
443: 423: 294: 418:
The project includes dozens of active chapters around the world, including
467: 400: 447: 435: 427: 419: 574:
Spitzner, L. (2003). "The Honeynet Project: Trapping the hackers".
646: 431: 527: 662: 439: 704: 122: 56: 15: 626: 371: 699: 391:
non-profit research organization that investigates new
80: 740:
Free software project foundations in the United States
91:, and by adding encyclopedic content written from a 366: 328: 318: 308: 300: 290: 282: 274: 256: 248: 153:. Unsourced material may be challenged and removed. 494:company site for public viewing and knowledge. 466:Raise awareness of the existing threats on the 8: 243: 50:Learn how and when to remove these messages 569: 567: 565: 242: 231:Learn how and when to remove this message 213:Learn how and when to remove this message 111:Learn how and when to remove this message 680:"Hackers caught in security 'honeypot'" 657: 655: 519: 462:The Honeynet Project has 3 main aims: 72:contains content that is written like 7: 673: 671: 602:"Matteo Lodi – The Honeynet Project" 546:"Honeypots and the Honeynet Project" 151:adding citations to reliable sources 14: 730:Organizations established in 1999 528:"About Us – the Honeynet Project" 31:This article has multiple issues. 127: 61: 20: 735:1999 establishments in Michigan 647:http://www.honeynet.org/project 138:needs additional citations for 39:or discuss these issues on the 1: 678:Johnson, Keith (2000-12-19). 663:http://www.honeynet.org/about 576:IEEE Security & Privacy 262:; 25 years ago 756: 700:Honeynet Project Home Page 627:http://www.honeynet.org/og 588:10.1109/MSECP.2003.1193207 720:Computer network security 356:Emmanouil Vasilomanolakis 324:Emmanouil Vasilomanolakis 481:Research and development 725:501(c)(3) organizations 682:. ZDNet. Archived from 332:Board of directors 320:Chief Executive Officer 399:tools to help improve 705:Honeynet Project Blog 407:behavioral patterns. 403:security by tracking 301:Registration no. 93:neutral point of view 509:Honeypot (computing) 387:is an international 385:The Honeynet Project 244:The Honeynet Project 147:improve this article 286:Ann Arbor, Michigan 245: 85:promotional content 632:2011-06-29 at the 450:, and many in the 162:"Honeynet Project" 87:and inappropriate 382: 381: 241: 240: 233: 223: 222: 215: 197: 121: 120: 113: 54: 747: 688: 687: 675: 666: 659: 650: 643: 637: 623: 617: 616: 614: 613: 604:. Archived from 598: 592: 591: 571: 560: 559: 557: 556: 538: 532: 531: 524: 378: 375: 373: 333: 270: 268: 263: 246: 236: 229: 218: 211: 207: 204: 198: 196: 155: 131: 123: 116: 109: 105: 102: 96: 74:an advertisement 65: 64: 57: 46: 24: 23: 16: 755: 754: 750: 749: 748: 746: 745: 744: 710: 709: 696: 691: 677: 676: 669: 660: 653: 644: 640: 634:Wayback Machine 624: 620: 611: 609: 600: 599: 595: 573: 572: 563: 554: 552: 542:Schneier, Bruce 540: 539: 535: 526: 525: 521: 517: 500: 483: 460: 413: 370: 362: 359:Maximilian Hils 335: 331: 321: 311: 266: 264: 261: 237: 226: 225: 224: 219: 208: 202: 199: 156: 154: 144: 132: 117: 106: 100: 97: 78: 66: 62: 25: 21: 12: 11: 5: 753: 751: 743: 742: 737: 732: 727: 722: 712: 711: 708: 707: 702: 695: 694:External links 692: 690: 689: 686:on 2001-02-10. 667: 651: 638: 618: 593: 561: 544:(2001-06-15). 533: 518: 516: 513: 512: 511: 506: 504:Cyber security 499: 496: 482: 479: 478: 477: 474: 471: 459: 456: 412: 409: 380: 379: 368: 364: 363: 361: 360: 357: 354: 351: 348: 345: 342: 338: 336: 329: 326: 325: 322: 319: 316: 315: 312: 309: 306: 305: 302: 298: 297: 292: 288: 287: 284: 280: 279: 278:Lance Spitzner 276: 272: 271: 258: 254: 253: 250: 239: 238: 221: 220: 135: 133: 126: 119: 118: 89:external links 69: 67: 60: 55: 29: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 752: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 717: 715: 706: 703: 701: 698: 697: 693: 685: 681: 674: 672: 668: 664: 658: 656: 652: 648: 642: 639: 635: 631: 628: 622: 619: 608:on 2022-08-09 607: 603: 597: 594: 589: 585: 581: 577: 570: 568: 566: 562: 551: 547: 543: 537: 534: 529: 523: 520: 514: 510: 507: 505: 502: 501: 497: 495: 491: 489: 480: 475: 472: 469: 465: 464: 463: 458:Project goals 457: 455: 453: 452:United States 449: 445: 441: 437: 433: 429: 425: 421: 416: 410: 408: 406: 402: 398: 395:and develops 394: 393:cyber attacks 390: 389:cybersecurity 386: 377: 369: 365: 358: 355: 352: 349: 346: 343: 340: 339: 337: 334: 327: 323: 317: 313: 307: 303: 299: 296: 293: 289: 285: 281: 277: 273: 259: 255: 251: 247: 235: 232: 217: 214: 206: 195: 192: 188: 185: 181: 178: 174: 171: 167: 164: –  163: 159: 158:Find sources: 152: 148: 142: 141: 136:This article 134: 130: 125: 124: 115: 112: 104: 94: 90: 86: 82: 76: 75: 70:This article 68: 59: 58: 53: 51: 44: 43: 38: 37: 32: 27: 18: 17: 684:the original 641: 621: 610:. Retrieved 606:the original 596: 582:(2): 15–23. 579: 575: 553:. Retrieved 549: 536: 522: 492: 490:challenges. 484: 461: 417: 414: 384: 383: 347:David Pisano 249:Abbreviation 227: 209: 200: 190: 183: 176: 169: 157: 145:Please help 140:verification 137: 107: 101:October 2014 98: 83:by removing 79:Please help 71: 47: 40: 34: 33:Please help 30: 550:Crypto-Gram 397:open-source 353:Hugo Gascón 350:Felix Leder 341:Jeff Nathan 314:Hugo Gascón 203:August 2018 714:Categories 612:2022-08-09 555:2014-10-27 515:References 344:Max Kilger 304:36-4460128 283:Founded at 173:newspapers 81:improve it 36:improve it 444:Australia 424:Indonesia 374:.honeynet 295:501(c)(3) 257:Formation 42:talk page 630:Archived 498:See also 488:Forensic 468:Internet 405:hackers' 401:Internet 310:Chairman 448:Ireland 411:History 367:Website 275:Founder 265: ( 187:scholar 436:Mexico 428:Greece 420:Brazil 189:  182:  175:  168:  160:  432:India 194:JSTOR 180:books 440:Iran 376:.org 291:Type 267:1999 260:1999 166:news 584:doi 372:www 252:THP 149:by 716:: 670:^ 654:^ 578:. 564:^ 548:. 454:. 446:, 442:, 438:, 434:, 430:, 426:, 422:, 45:. 665:. 649:. 636:. 615:. 590:. 586:: 580:1 558:. 530:. 470:. 269:) 234:) 228:( 216:) 210:( 205:) 201:( 191:· 184:· 177:· 170:· 143:. 114:) 108:( 103:) 99:( 95:. 77:. 52:) 48:(

Index

improve it
talk page
Learn how and when to remove these messages
an advertisement
improve it
promotional content
external links
neutral point of view
Learn how and when to remove this message

verification
improve this article
adding citations to reliable sources
"Honeynet Project"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Learn how and when to remove this message
501(c)(3)
Board of directors
www.honeynet.org
cybersecurity
cyber attacks
open-source
Internet
hackers'
Brazil

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.