Portable HoneyPot & HoneyNet: Within a Closed Network

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Polytechnic University of Puerto Rico

Abstract

At any given time a business network could be or has been compromised by a hacker or its information been exposed or breach. This is why building a honeypot and understanding how to use it can help network security expert, avoid being hack in the first or try to mitigate those attacks and breach. It also shows that this tools can be used for research purpose in a local home network for test and research. This paper will explain what honeypots and honeynets are, and the help of building one in a Microsoft environment using low cost tools and hardware and being portable. Key Terms - Hackers, Honeynets, Honeypots, Packets.

Description

Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico

Keywords

Citation

Concepción Rivera, H. D. (2015). Portable HoneyPot & HoneyNet: within a closed network [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.

Collections

Endorsement

Review

Supplemented By

Referenced By