IDS mailing list archives

Use of Honeynets to Secure Large Enterprise Networks


From: John Levine <levine () ece gatech edu>
Date: Tue, 1 Jul 2003 14:14:29 -0400 (EDT)

To all,
    We recently presented a paper title "The Use of Honeynets to Detect
Exploited Systems Across Large Enterprise Networks" at the 4th Annual
Information Assurance Conferences at West Point.  The paper addressed the
establishment of a Honeynet within a large enterprise network (35,000+
machines, 2 1/2 Class B network address range) here at Georgia Tech.  The
network administrators are very supportive of this effort and now feel the
Honeynet is an important part of the Security Architecture here  The paper
is available at the following web site:  http://www.tracking-hackers.com.
If anyone has any questions concerning the paper than please feel free to
contact me.

John Levine
School of Electrical and Computer Engineering
Georgia Institute of Technology
Atlanta, Georgia 30332
levine () ece gatech edu


-------------------------------------------------------------------------------
Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
world's premier technical IT security event! 10 tracks, 15 training sessions, 
1,800 delegates from 30 nations including all of the top experts, from CSO's to 
"underground" security specialists.  See for yourself what the buzz is about!  
Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
-------------------------------------------------------------------------------


Current thread: