Selecting a Honeypot
Once you have clearly defined your goals, the next step is selecting the honeypot solution. This step is critical, since each honeypot has its different strengths and weaknesses. If you select the wrong solution, it will most likely fail or, even worse, increase the risk to your organization.
When selecting a honeypot, you should consider these three criteria.
Level of interaction. How much functionality do you need to provide an attacker for your honeypot to perform? The greater the interaction, the more you can learn. However, the greater the interaction, the greater the complexity and risk. By reducing the level of interaction, we reduce the chance of something going wrong.
Commercial versus homemade. Commercial honeypots ...
Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.