140:
74:
33:
504:
The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies. These computer production systems are added online and the network of volunteers scans the network for attacks or suspicious activity. The findings are published on the
496:
The
Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The group's research provides sensitive information regarding attackers. This includes their motives,
750:
497:
communication methods, attack timelines, and actions following a system attack. This information is provided through Know Your Enemy white papers, The
Project blog posts, and Scan of the Month
426:
The
Honeynet Project began in 1999 as a mailing list to a select few. The group expanded and officially dubbed itself as The Honeynet Project in June 2000.
740:
484:
Conduct research covering data analysis approaches unique security tool development, and gathering data about attackers and malicious software they use.
745:
690:
84:
730:
103:
241:
223:
157:
121:
60:
46:
735:
204:
176:
161:
612:
183:
99:
415:
190:
150:
172:
52:
519:
640:
694:
498:
487:
Provide the tools and techniques used by The
Honeynet Project so other organizations can benefit.
341:
672:
About The
Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
399:
197:
95:
594:
644:
552:
724:
514:
462:
636:
Groups directory | The
Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from
556:
407:
403:
139:
17:
616:
598:
656:
Projects | The
Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from
454:
434:
305:
429:
The project includes dozens of active chapters around the world, including
478:
411:
458:
446:
438:
430:
585:
Spitzner, L. (2003). "The
Honeynet Project: Trapping the hackers".
657:
442:
538:
673:
450:
715:
133:
67:
26:
637:
382:
710:
402:
non-profit research organization that investigates new
91:
751:
Free software project foundations in the United States
102:, and by adding encyclopedic content written from a
377:
339:
329:
319:
311:
301:
293:
285:
267:
259:
164:. Unsourced material may be challenged and removed.
505:company site for public viewing and knowledge.
477:Raise awareness of the existing threats on the
8:
254:
61:Learn how and when to remove these messages
580:
578:
576:
253:
242:Learn how and when to remove this message
224:Learn how and when to remove this message
122:Learn how and when to remove this message
691:"Hackers caught in security 'honeypot'"
668:
666:
530:
473:The Honeynet Project has 3 main aims:
83:contains content that is written like
7:
684:
682:
613:"Matteo Lodi – The Honeynet Project"
557:"Honeypots and the Honeynet Project"
162:adding citations to reliable sources
25:
741:Organizations established in 1999
539:"About Us – the Honeynet Project"
42:This article has multiple issues.
138:
72:
31:
746:1999 establishments in Michigan
658:http://www.honeynet.org/project
149:needs additional citations for
50:or discuss these issues on the
1:
689:Johnson, Keith (2000-12-19).
674:http://www.honeynet.org/about
587:IEEE Security & Privacy
273:; 25 years ago
767:
711:Honeynet Project Home Page
638:http://www.honeynet.org/og
599:10.1109/MSECP.2003.1193207
731:Computer network security
367:Emmanouil Vasilomanolakis
335:Emmanouil Vasilomanolakis
492:Research and development
736:501(c)(3) organizations
693:. ZDNet. Archived from
343:Board of directors
331:Chief Executive Officer
410:tools to help improve
716:Honeynet Project Blog
418:behavioral patterns.
414:security by tracking
312:Registration no.
104:neutral point of view
520:Honeypot (computing)
398:is an international
396:The Honeynet Project
255:The Honeynet Project
158:improve this article
297:Ann Arbor, Michigan
256:
96:promotional content
643:2011-06-29 at the
461:, and many in the
173:"Honeynet Project"
98:and inappropriate
393:
392:
252:
251:
244:
234:
233:
226:
208:
132:
131:
124:
65:
16:(Redirected from
758:
699:
698:
686:
677:
670:
661:
654:
648:
634:
628:
627:
625:
624:
615:. Archived from
609:
603:
602:
582:
571:
570:
568:
567:
549:
543:
542:
535:
389:
386:
384:
344:
281:
279:
274:
257:
247:
240:
229:
222:
218:
215:
209:
207:
166:
142:
134:
127:
120:
116:
113:
107:
85:an advertisement
76:
75:
68:
57:
35:
34:
27:
21:
18:Honeynet project
766:
765:
761:
760:
759:
757:
756:
755:
721:
720:
707:
702:
688:
687:
680:
671:
664:
655:
651:
645:Wayback Machine
635:
631:
622:
620:
611:
610:
606:
584:
583:
574:
565:
563:
553:Schneier, Bruce
551:
550:
546:
537:
536:
532:
528:
511:
494:
471:
424:
381:
373:
370:Maximilian Hils
346:
342:
332:
322:
277:
275:
272:
248:
237:
236:
235:
230:
219:
213:
210:
167:
165:
155:
143:
128:
117:
111:
108:
89:
77:
73:
36:
32:
23:
22:
15:
12:
11:
5:
764:
762:
754:
753:
748:
743:
738:
733:
723:
722:
719:
718:
713:
706:
705:External links
703:
701:
700:
697:on 2001-02-10.
678:
662:
649:
629:
604:
572:
555:(2001-06-15).
544:
529:
527:
524:
523:
522:
517:
515:Cyber security
510:
507:
493:
490:
489:
488:
485:
482:
470:
467:
423:
420:
391:
390:
379:
375:
374:
372:
371:
368:
365:
362:
359:
356:
353:
349:
347:
340:
337:
336:
333:
330:
327:
326:
323:
320:
317:
316:
313:
309:
308:
303:
299:
298:
295:
291:
290:
289:Lance Spitzner
287:
283:
282:
269:
265:
264:
261:
250:
249:
232:
231:
146:
144:
137:
130:
129:
100:external links
80:
78:
71:
66:
40:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
763:
752:
749:
747:
744:
742:
739:
737:
734:
732:
729:
728:
726:
717:
714:
712:
709:
708:
704:
696:
692:
685:
683:
679:
675:
669:
667:
663:
659:
653:
650:
646:
642:
639:
633:
630:
619:on 2022-08-09
618:
614:
608:
605:
600:
596:
592:
588:
581:
579:
577:
573:
562:
558:
554:
548:
545:
540:
534:
531:
525:
521:
518:
516:
513:
512:
508:
506:
502:
500:
491:
486:
483:
480:
476:
475:
474:
469:Project goals
468:
466:
464:
463:United States
460:
456:
452:
448:
444:
440:
436:
432:
427:
421:
419:
417:
413:
409:
406:and develops
405:
404:cyber attacks
401:
400:cybersecurity
397:
388:
380:
376:
369:
366:
363:
360:
357:
354:
351:
350:
348:
345:
338:
334:
328:
324:
318:
314:
310:
307:
304:
300:
296:
292:
288:
284:
270:
266:
262:
258:
246:
243:
228:
225:
217:
206:
203:
199:
196:
192:
189:
185:
182:
178:
175: –
174:
170:
169:Find sources:
163:
159:
153:
152:
147:This article
145:
141:
136:
135:
126:
123:
115:
105:
101:
97:
93:
87:
86:
81:This article
79:
70:
69:
64:
62:
55:
54:
49:
48:
43:
38:
29:
28:
19:
695:the original
652:
632:
621:. Retrieved
617:the original
607:
593:(2): 15–23.
590:
586:
564:. Retrieved
560:
547:
533:
503:
501:challenges.
495:
472:
428:
425:
395:
394:
358:David Pisano
260:Abbreviation
238:
220:
211:
201:
194:
187:
180:
168:
156:Please help
151:verification
148:
118:
112:October 2014
109:
94:by removing
90:Please help
82:
58:
51:
45:
44:Please help
41:
561:Crypto-Gram
408:open-source
364:Hugo Gascón
361:Felix Leder
352:Jeff Nathan
325:Hugo Gascón
214:August 2018
725:Categories
623:2022-08-09
566:2014-10-27
526:References
355:Max Kilger
315:36-4460128
294:Founded at
184:newspapers
92:improve it
47:improve it
455:Australia
435:Indonesia
385:.honeynet
306:501(c)(3)
268:Formation
53:talk page
641:Archived
509:See also
499:Forensic
479:Internet
416:hackers'
412:Internet
321:Chairman
459:Ireland
422:History
378:Website
286:Founder
276: (
198:scholar
447:Mexico
439:Greece
431:Brazil
200:
193:
186:
179:
171:
443:India
205:JSTOR
191:books
451:Iran
387:.org
302:Type
278:1999
271:1999
177:news
595:doi
383:www
263:THP
160:by
727::
681:^
665:^
589:.
575:^
559:.
465:.
457:,
453:,
449:,
445:,
441:,
437:,
433:,
56:.
676:.
660:.
647:.
626:.
601:.
597::
591:1
569:.
541:.
481:.
280:)
245:)
239:(
227:)
221:(
216:)
212:(
202:·
195:·
188:·
181:·
154:.
125:)
119:(
114:)
110:(
106:.
88:.
63:)
59:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.