Knowledge (XXG)

Honeynet Project

Source 📝

140: 74: 33: 504:
The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies. These computer production systems are added online and the network of volunteers scans the network for attacks or suspicious activity. The findings are published on the
496:
The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The group's research provides sensitive information regarding attackers. This includes their motives,
750: 497:
communication methods, attack timelines, and actions following a system attack. This information is provided through Know Your Enemy white papers, The Project blog posts, and Scan of the Month
426:
The Honeynet Project began in 1999 as a mailing list to a select few. The group expanded and officially dubbed itself as The Honeynet Project in June 2000.
740: 484:
Conduct research covering data analysis approaches unique security tool development, and gathering data about attackers and malicious software they use.
745: 690: 84: 730: 103: 241: 223: 157: 121: 60: 46: 735: 204: 176: 161: 612: 183: 99: 415: 190: 150: 172: 52: 519: 640: 694: 498: 487:
Provide the tools and techniques used by The Honeynet Project so other organizations can benefit.
341: 672:
About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
399: 197: 95: 594: 644: 552: 724: 514: 462: 636:
Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from
556: 407: 403: 139: 17: 616: 598: 656:
Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
454: 434: 305: 429:
The project includes dozens of active chapters around the world, including
478: 411: 458: 446: 438: 430: 585:
Spitzner, L. (2003). "The Honeynet Project: Trapping the hackers".
657: 442: 538: 673: 450: 715: 133: 67: 26: 637: 382: 710: 402:
non-profit research organization that investigates new
91: 751:
Free software project foundations in the United States
102:, and by adding encyclopedic content written from a 377: 339: 329: 319: 311: 301: 293: 285: 267: 259: 164:. Unsourced material may be challenged and removed. 505:company site for public viewing and knowledge. 477:Raise awareness of the existing threats on the 8: 254: 61:Learn how and when to remove these messages 580: 578: 576: 253: 242:Learn how and when to remove this message 224:Learn how and when to remove this message 122:Learn how and when to remove this message 691:"Hackers caught in security 'honeypot'" 668: 666: 530: 473:The Honeynet Project has 3 main aims: 83:contains content that is written like 7: 684: 682: 613:"Matteo Lodi – The Honeynet Project" 557:"Honeypots and the Honeynet Project" 162:adding citations to reliable sources 25: 741:Organizations established in 1999 539:"About Us – the Honeynet Project" 42:This article has multiple issues. 138: 72: 31: 746:1999 establishments in Michigan 658:http://www.honeynet.org/project 149:needs additional citations for 50:or discuss these issues on the 1: 689:Johnson, Keith (2000-12-19). 674:http://www.honeynet.org/about 587:IEEE Security & Privacy 273:; 25 years ago 767: 711:Honeynet Project Home Page 638:http://www.honeynet.org/og 599:10.1109/MSECP.2003.1193207 731:Computer network security 367:Emmanouil Vasilomanolakis 335:Emmanouil Vasilomanolakis 492:Research and development 736:501(c)(3) organizations 693:. ZDNet. Archived from 343:Board of directors 331:Chief Executive Officer 410:tools to help improve 716:Honeynet Project Blog 418:behavioral patterns. 414:security by tracking 312:Registration no. 104:neutral point of view 520:Honeypot (computing) 398:is an international 396:The Honeynet Project 255:The Honeynet Project 158:improve this article 297:Ann Arbor, Michigan 256: 96:promotional content 643:2011-06-29 at the 461:, and many in the 173:"Honeynet Project" 98:and inappropriate 393: 392: 252: 251: 244: 234: 233: 226: 208: 132: 131: 124: 65: 16:(Redirected from 758: 699: 698: 686: 677: 670: 661: 654: 648: 634: 628: 627: 625: 624: 615:. Archived from 609: 603: 602: 582: 571: 570: 568: 567: 549: 543: 542: 535: 389: 386: 384: 344: 281: 279: 274: 257: 247: 240: 229: 222: 218: 215: 209: 207: 166: 142: 134: 127: 120: 116: 113: 107: 85:an advertisement 76: 75: 68: 57: 35: 34: 27: 21: 18:Honeynet project 766: 765: 761: 760: 759: 757: 756: 755: 721: 720: 707: 702: 688: 687: 680: 671: 664: 655: 651: 645:Wayback Machine 635: 631: 622: 620: 611: 610: 606: 584: 583: 574: 565: 563: 553:Schneier, Bruce 551: 550: 546: 537: 536: 532: 528: 511: 494: 471: 424: 381: 373: 370:Maximilian Hils 346: 342: 332: 322: 277: 275: 272: 248: 237: 236: 235: 230: 219: 213: 210: 167: 165: 155: 143: 128: 117: 111: 108: 89: 77: 73: 36: 32: 23: 22: 15: 12: 11: 5: 764: 762: 754: 753: 748: 743: 738: 733: 723: 722: 719: 718: 713: 706: 705:External links 703: 701: 700: 697:on 2001-02-10. 678: 662: 649: 629: 604: 572: 555:(2001-06-15). 544: 529: 527: 524: 523: 522: 517: 515:Cyber security 510: 507: 493: 490: 489: 488: 485: 482: 470: 467: 423: 420: 391: 390: 379: 375: 374: 372: 371: 368: 365: 362: 359: 356: 353: 349: 347: 340: 337: 336: 333: 330: 327: 326: 323: 320: 317: 316: 313: 309: 308: 303: 299: 298: 295: 291: 290: 289:Lance Spitzner 287: 283: 282: 269: 265: 264: 261: 250: 249: 232: 231: 146: 144: 137: 130: 129: 100:external links 80: 78: 71: 66: 40: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 763: 752: 749: 747: 744: 742: 739: 737: 734: 732: 729: 728: 726: 717: 714: 712: 709: 708: 704: 696: 692: 685: 683: 679: 675: 669: 667: 663: 659: 653: 650: 646: 642: 639: 633: 630: 619:on 2022-08-09 618: 614: 608: 605: 600: 596: 592: 588: 581: 579: 577: 573: 562: 558: 554: 548: 545: 540: 534: 531: 525: 521: 518: 516: 513: 512: 508: 506: 502: 500: 491: 486: 483: 480: 476: 475: 474: 469:Project goals 468: 466: 464: 463:United States 460: 456: 452: 448: 444: 440: 436: 432: 427: 421: 419: 417: 413: 409: 406:and develops 405: 404:cyber attacks 401: 400:cybersecurity 397: 388: 380: 376: 369: 366: 363: 360: 357: 354: 351: 350: 348: 345: 338: 334: 328: 324: 318: 314: 310: 307: 304: 300: 296: 292: 288: 284: 270: 266: 262: 258: 246: 243: 228: 225: 217: 206: 203: 199: 196: 192: 189: 185: 182: 178: 175: –  174: 170: 169:Find sources: 163: 159: 153: 152: 147:This article 145: 141: 136: 135: 126: 123: 115: 105: 101: 97: 93: 87: 86: 81:This article 79: 70: 69: 64: 62: 55: 54: 49: 48: 43: 38: 29: 28: 19: 695:the original 652: 632: 621:. Retrieved 617:the original 607: 593:(2): 15–23. 590: 586: 564:. Retrieved 560: 547: 533: 503: 501:challenges. 495: 472: 428: 425: 395: 394: 358:David Pisano 260:Abbreviation 238: 220: 211: 201: 194: 187: 180: 168: 156:Please help 151:verification 148: 118: 112:October 2014 109: 94:by removing 90:Please help 82: 58: 51: 45: 44:Please help 41: 561:Crypto-Gram 408:open-source 364:Hugo Gascón 361:Felix Leder 352:Jeff Nathan 325:Hugo Gascón 214:August 2018 725:Categories 623:2022-08-09 566:2014-10-27 526:References 355:Max Kilger 315:36-4460128 294:Founded at 184:newspapers 92:improve it 47:improve it 455:Australia 435:Indonesia 385:.honeynet 306:501(c)(3) 268:Formation 53:talk page 641:Archived 509:See also 499:Forensic 479:Internet 416:hackers' 412:Internet 321:Chairman 459:Ireland 422:History 378:Website 286:Founder 276: ( 198:scholar 447:Mexico 439:Greece 431:Brazil 200:  193:  186:  179:  171:  443:India 205:JSTOR 191:books 451:Iran 387:.org 302:Type 278:1999 271:1999 177:news 595:doi 383:www 263:THP 160:by 727:: 681:^ 665:^ 589:. 575:^ 559:. 465:. 457:, 453:, 449:, 445:, 441:, 437:, 433:, 56:. 676:. 660:. 647:. 626:. 601:. 597:: 591:1 569:. 541:. 481:. 280:) 245:) 239:( 227:) 221:( 216:) 212:( 202:· 195:· 188:· 181:· 154:. 125:) 119:( 114:) 110:( 106:. 88:. 63:) 59:( 20:)

Index

Honeynet project
improve it
talk page
Learn how and when to remove these messages
an advertisement
improve it
promotional content
external links
neutral point of view
Learn how and when to remove this message

verification
improve this article
adding citations to reliable sources
"Honeynet Project"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Learn how and when to remove this message
501(c)(3)
Board of directors
www.honeynet.org
cybersecurity
cyber attacks
open-source
Internet
hackers'

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.