129:
63:
22:
493:
The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies. These computer production systems are added online and the network of volunteers scans the network for attacks or suspicious activity. The findings are published on the
485:
The
Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The group's research provides sensitive information regarding attackers. This includes their motives,
739:
486:
communication methods, attack timelines, and actions following a system attack. This information is provided through Know Your Enemy white papers, The
Project blog posts, and Scan of the Month
415:
The
Honeynet Project began in 1999 as a mailing list to a select few. The group expanded and officially dubbed itself as The Honeynet Project in June 2000.
729:
473:
Conduct research covering data analysis approaches unique security tool development, and gathering data about attackers and malicious software they use.
734:
679:
73:
719:
92:
230:
212:
146:
110:
49:
35:
724:
193:
165:
150:
601:
172:
88:
404:
179:
139:
161:
41:
508:
629:
683:
487:
476:
Provide the tools and techniques used by The
Honeynet Project so other organizations can benefit.
330:
661:
About The
Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
388:
186:
84:
583:
633:
541:
713:
503:
451:
625:
Groups directory | The
Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from
545:
396:
392:
128:
605:
587:
645:
Projects | The
Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
443:
423:
294:
418:
The project includes dozens of active chapters around the world, including
467:
400:
447:
435:
427:
419:
574:
Spitzner, L. (2003). "The
Honeynet Project: Trapping the hackers".
646:
431:
527:
662:
439:
704:
122:
56:
15:
626:
371:
699:
391:
non-profit research organization that investigates new
80:
740:
Free software project foundations in the United States
91:, and by adding encyclopedic content written from a
366:
328:
318:
308:
300:
290:
282:
274:
256:
248:
153:. Unsourced material may be challenged and removed.
494:company site for public viewing and knowledge.
466:Raise awareness of the existing threats on the
8:
243:
50:Learn how and when to remove these messages
569:
567:
565:
242:
231:Learn how and when to remove this message
213:Learn how and when to remove this message
111:Learn how and when to remove this message
680:"Hackers caught in security 'honeypot'"
657:
655:
519:
462:The Honeynet Project has 3 main aims:
72:contains content that is written like
7:
673:
671:
602:"Matteo Lodi – The Honeynet Project"
546:"Honeypots and the Honeynet Project"
151:adding citations to reliable sources
14:
730:Organizations established in 1999
528:"About Us – the Honeynet Project"
31:This article has multiple issues.
127:
61:
20:
735:1999 establishments in Michigan
647:http://www.honeynet.org/project
138:needs additional citations for
39:or discuss these issues on the
1:
678:Johnson, Keith (2000-12-19).
663:http://www.honeynet.org/about
576:IEEE Security & Privacy
262:; 25 years ago
756:
700:Honeynet Project Home Page
627:http://www.honeynet.org/og
588:10.1109/MSECP.2003.1193207
720:Computer network security
356:Emmanouil Vasilomanolakis
324:Emmanouil Vasilomanolakis
481:Research and development
725:501(c)(3) organizations
682:. ZDNet. Archived from
332:Board of directors
320:Chief Executive Officer
399:tools to help improve
705:Honeynet Project Blog
407:behavioral patterns.
403:security by tracking
301:Registration no.
93:neutral point of view
509:Honeypot (computing)
387:is an international
385:The Honeynet Project
244:The Honeynet Project
147:improve this article
286:Ann Arbor, Michigan
245:
85:promotional content
632:2011-06-29 at the
450:, and many in the
162:"Honeynet Project"
87:and inappropriate
382:
381:
241:
240:
233:
223:
222:
215:
197:
121:
120:
113:
54:
747:
688:
687:
675:
666:
659:
650:
643:
637:
623:
617:
616:
614:
613:
604:. Archived from
598:
592:
591:
571:
560:
559:
557:
556:
538:
532:
531:
524:
378:
375:
373:
333:
270:
268:
263:
246:
236:
229:
218:
211:
207:
204:
198:
196:
155:
131:
123:
116:
109:
105:
102:
96:
74:an advertisement
65:
64:
57:
46:
24:
23:
16:
755:
754:
750:
749:
748:
746:
745:
744:
710:
709:
696:
691:
677:
676:
669:
660:
653:
644:
640:
634:Wayback Machine
624:
620:
611:
609:
600:
599:
595:
573:
572:
563:
554:
552:
542:Schneier, Bruce
540:
539:
535:
526:
525:
521:
517:
500:
483:
460:
413:
370:
362:
359:Maximilian Hils
335:
331:
321:
311:
266:
264:
261:
237:
226:
225:
224:
219:
208:
202:
199:
156:
154:
144:
132:
117:
106:
100:
97:
78:
66:
62:
25:
21:
12:
11:
5:
753:
751:
743:
742:
737:
732:
727:
722:
712:
711:
708:
707:
702:
695:
694:External links
692:
690:
689:
686:on 2001-02-10.
667:
651:
638:
618:
593:
561:
544:(2001-06-15).
533:
518:
516:
513:
512:
511:
506:
504:Cyber security
499:
496:
482:
479:
478:
477:
474:
471:
459:
456:
412:
409:
380:
379:
368:
364:
363:
361:
360:
357:
354:
351:
348:
345:
342:
338:
336:
329:
326:
325:
322:
319:
316:
315:
312:
309:
306:
305:
302:
298:
297:
292:
288:
287:
284:
280:
279:
278:Lance Spitzner
276:
272:
271:
258:
254:
253:
250:
239:
238:
221:
220:
135:
133:
126:
119:
118:
89:external links
69:
67:
60:
55:
29:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
752:
741:
738:
736:
733:
731:
728:
726:
723:
721:
718:
717:
715:
706:
703:
701:
698:
697:
693:
685:
681:
674:
672:
668:
664:
658:
656:
652:
648:
642:
639:
635:
631:
628:
622:
619:
608:on 2022-08-09
607:
603:
597:
594:
589:
585:
581:
577:
570:
568:
566:
562:
551:
547:
543:
537:
534:
529:
523:
520:
514:
510:
507:
505:
502:
501:
497:
495:
491:
489:
480:
475:
472:
469:
465:
464:
463:
458:Project goals
457:
455:
453:
452:United States
449:
445:
441:
437:
433:
429:
425:
421:
416:
410:
408:
406:
402:
398:
395:and develops
394:
393:cyber attacks
390:
389:cybersecurity
386:
377:
369:
365:
358:
355:
352:
349:
346:
343:
340:
339:
337:
334:
327:
323:
317:
313:
307:
303:
299:
296:
293:
289:
285:
281:
277:
273:
259:
255:
251:
247:
235:
232:
217:
214:
206:
195:
192:
188:
185:
181:
178:
174:
171:
167:
164: –
163:
159:
158:Find sources:
152:
148:
142:
141:
136:This article
134:
130:
125:
124:
115:
112:
104:
94:
90:
86:
82:
76:
75:
70:This article
68:
59:
58:
53:
51:
44:
43:
38:
37:
32:
27:
18:
17:
684:the original
641:
621:
610:. Retrieved
606:the original
596:
582:(2): 15–23.
579:
575:
553:. Retrieved
549:
536:
522:
492:
490:challenges.
484:
461:
417:
414:
384:
383:
347:David Pisano
249:Abbreviation
227:
209:
200:
190:
183:
176:
169:
157:
145:Please help
140:verification
137:
107:
101:October 2014
98:
83:by removing
79:Please help
71:
47:
40:
34:
33:Please help
30:
550:Crypto-Gram
397:open-source
353:Hugo Gascón
350:Felix Leder
341:Jeff Nathan
314:Hugo Gascón
203:August 2018
714:Categories
612:2022-08-09
555:2014-10-27
515:References
344:Max Kilger
304:36-4460128
283:Founded at
173:newspapers
81:improve it
36:improve it
444:Australia
424:Indonesia
374:.honeynet
295:501(c)(3)
257:Formation
42:talk page
630:Archived
498:See also
488:Forensic
468:Internet
405:hackers'
401:Internet
310:Chairman
448:Ireland
411:History
367:Website
275:Founder
265: (
187:scholar
436:Mexico
428:Greece
420:Brazil
189:
182:
175:
168:
160:
432:India
194:JSTOR
180:books
440:Iran
376:.org
291:Type
267:1999
260:1999
166:news
584:doi
372:www
252:THP
149:by
716::
670:^
654:^
578:.
564:^
548:.
454:.
446:,
442:,
438:,
434:,
430:,
426:,
422:,
45:.
665:.
649:.
636:.
615:.
590:.
586::
580:1
558:.
530:.
470:.
269:)
234:)
228:(
216:)
210:(
205:)
201:(
191:·
184:·
177:·
170:·
143:.
114:)
108:(
103:)
99:(
95:.
77:.
52:)
48:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.