IDS mailing list archives
Use of Honeynets to Secure Large Enterprise Networks
From: John Levine <levine () ece gatech edu>
Date: Tue, 1 Jul 2003 14:14:29 -0400 (EDT)
To all, We recently presented a paper title "The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks" at the 4th Annual Information Assurance Conferences at West Point. The paper addressed the establishment of a Honeynet within a large enterprise network (35,000+ machines, 2 1/2 Class B network address range) here at Georgia Tech. The network administrators are very supportive of this effort and now feel the Honeynet is an important part of the Security Architecture here The paper is available at the following web site: http://www.tracking-hackers.com. If anyone has any questions concerning the paper than please feel free to contact me. John Levine School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, Georgia 30332 levine () ece gatech edu ------------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com -------------------------------------------------------------------------------
Current thread:
- Use of Honeynets to Secure Large Enterprise Networks John Levine (Jul 02)