Honeynet Project

The Honeynet Project is an international security research organization, "dedicated to investigating the latest attacks, developing open source security tools to improve Internet security and learning how hackers behave".[2] The Honeynet Project pioneered the use of the honeynet, "a collection of high interaction honeypots on a tightly controlled and highly monitored network."[3]

The Honeynet Project
AbbreviationTHP
Formation1999 (1999)
FounderLance Spitzner
Founded atAnn Arbor, Michigan
Type501(c)(3)
Registration no.36-4460128
Chairman
Felix Leder
  • David Pisano
  • Jeff Nathan
  • Max Kilger
  • Daniel Haslinge
  • Sébastien Tricaud
  • Tan Kean Siong
  • [1]
Websitewww.honeynet.org

History

The Honeynet Project began in 1999 as a small mailing list of a group of people.[4]

Over time, the group expanded and officially dubbed itself as The Honeynet Project in June 2000.[4]

The project includes dozens of active chapters around the world, including Brazil, Indonesia, Greece, India, Mexico, Iran, Australia, Ireland, and many in the United States.[5]

Project goals

The Honeynet Project focuses on three primary goals:[6]

  • Raise awareness of the existing threats on the Internet.
  • Conduct research covering data analysis approaches, unique security tool development, and gathering data about attackers and malicious software they use.
  • Provide the tools[7] and techniques used by The Honeynet Project so that other organizations can benefit.

Research and development

The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, unique security tool development, and gathering data about attackers and malicious software they use. The Project research provides critical additional information, such as their motives in attacking, how they communicate, when they attack systems, and their actions after compromising a system. Such information is provided through Know Your Enemy whitepapers, The Project blog posts, and Scan of the Month / Forensic challenges.

The project uses normal computers, without any known vulnerabilities,[8] and monitors the network for attacks.[9]

gollark: I just did maintenance on osmarks.net's primary server for MULTIPLE minutes and nobody noticed the downtime. Muahahaha.
gollark: Apply accursed CSS filters?
gollark: Utilise KaTeX?
gollark: Just try and make it boot and do console IO first.
gollark: A GUI involves 86 trillion apiform.

See also

References

  1. "About Us – the Honeynet Project".
  2. Schneier, Bruce (2001-06-15). "Honeypots and the Honeynet Project". Crypto-Gram. Retrieved 2014-10-27.
  3. "Honeynets - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 2020-08-10.
  4. Spitzner, Lance (2003). The Honeynet Pro6wia66ject: Trapping the Hackers. IEEE Security & Privacy, 1(2), pp 15-23. Brief History of the Honeynet Project. Retrieved from https://ieeexplore.ieee.org/document/1193207/.
  5. Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from http://www.honeynet.org/og.
  6. About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/about.
  7. Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/project.
  8. Johnson, Keith (2000-12-19). "Hackers caught in security 'honeypot'". ZDNet. Archived from the original on 2001-02-10.
  9. Spitzner, L. (2003). "The Honeynet Project: trapping the hackers". IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy. 1 (2): 15–23. doi:10.1109/MSECP.2003.1193207.

Bibliography

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.