Honeypots: A New Paradigm to Information Security, 1st Edition (Hardback) book cover

Honeypots

A New Paradigm to Information Security, 1st Edition

Edited by R. C. Joshi, Anjali Sardana

CRC Press

340 pages

Purchasing Options:$ = USD
Hardback: 9781578087082
pub: 2011-02-03
SAVE ~$36.00
$180.00
$144.00
x
eBook (VitalSource) : 9780429061905
pub: 2011-02-03
from $28.98


FREE Standard Shipping!

Description

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Table of Contents

Honeypots

Background

Honeypots

Honeypots vs. Firewalls and Intrusion

Classification of Honeypots

Placement of Honeypots

Varieties of Honeypots: Honey tokens, Honeypages, Honeynets and Honeyfarms

Value of Honeypots

Risks and Tradeoffs

Key Issues and Challenges

Commercially Available Honeypots

Backofficer Friendly

Specter

Mantrap

Honeyd

Honeynets

Overview of Honeynets

Value of Honeynets

Working of Honeynet

Honeynet Architectures

Sweetening the Honeynets

Risks Associated with Honeynets

Attacks and Role of Honeypots

Phases of Attack and Honeypots

Worms and Virus Attacks

Spam and Phishing Mails

Distributed Denial of Service Attacks

Static Honeypots

Honeypot as Detection Systems

Honeypot as Deception Systems

Virtual Honeypots

Virtual Honeypot: VMware Workstation

Data Capture on Virtual Honeypots

Raw Disks and Virtual Disks

Virtual Honeynet

Case Study

Dynamic Honeypots

Issues with Static Honeypots

Dynamic Honeypots

Dynamic Honeypot Design

Dynamic Honeypot

Construction

Benefits

Wireless Honeypots

Introduction to Wireless Local Area Networks

Basic Wireless Concepts

Security

Wireless Attacks: From A

Blackhat’s perspective

Wireless Honeypots

Limitations

Applications of Honeypot

Defense against automated attacks

Protection against human intruders

Surgical Detection Methods

Cyber-Forensics

Network Surveillance

Forensic Analysis

Tactical Battlefield

Use as Deterrent

Research

Purpose

Anti Honeypot Technology

Network Issues

System Issues

Techniques for Honeypot Detection

Counter-measure for Detection of

Honeypot Deployment

Honeypots and Network Forensics

Network Forensics

Honeypot as Network Forensic Analysis Tools

Honeypot Based Network Forensics

Frameworks

Subject Categories

BISAC Subject Codes/Headings:
COM053000
COMPUTERS / Security / General
COM059000
COMPUTERS / Computer Engineering