Skip to main content

Deploying Honeypots and Honeynets: Issues of Liability

  • Conference paper
  • First Online:
Computer Networks (CN 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 522))

Included in the following conference series:

Abstract

Honeypots and honeynets are common tools for network security and network forensics. The deployment and usage of these tools is affected by a number of the technical and legal issues. It is very important to consider both issues together. Therefore, paper outlines technical aspects of honeynet and discusses the liability of honeypot’s and honeynet’s administrator. Paper deals with civil and criminal liability. Also paper focuses on cybercrime and liability of attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  2. Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15–23. IEEE (2004)

    Google Scholar 

  3. The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison-Wesley, Boston (2004)

    Google Scholar 

  4. Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1–6. IEEE, Australasian (2009)

    Google Scholar 

  5. Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 21–28. IEEE (2005)

    Google Scholar 

  6. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security (ICCCS 2011), pp. 600–605. ACM (2011)

    Google Scholar 

  7. Vrable, M., et al.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ACM SIGOPS Operating Syst. Rev. 39(5), 148–162 (2005)

    Google Scholar 

  8. Husak, M., Vizvary, M.: POSTER: reflected attacks abusing honeypots. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1452. ACM (2013)

    Google Scholar 

  9. Martin, E.A., Law, J. (eds.): A Dictionary of Law. Oxford University Press, Oxford (1997)

    Google Scholar 

  10. Black, H.C., Garner, B.A.: Black’s Law Dictionary. West Publishing Company, USA (1999)

    Google Scholar 

  11. Scottberg, B., Yurcik, W., Doss, D.: Internet honeypots: protection or entrapment? In: International Symposium on Technology and Society, (ISTAS 2002), pp. 387–391. IEEE (2002)

    Google Scholar 

  12. Mokube, I.: Honeynets - concepts, approaches and challenges. In: Proceedings of the 45th Annual Southeast Regional Conference, pp. 321–326. ACM (2007)

    Google Scholar 

  13. Rubin, B., Cheung, D.: Computer security education and research: handle with care. In: Security and Privacy, pp. 56–59. IEEE (2006)

    Google Scholar 

  14. Dornseif, M., Gärtner, F.C., Holz, T.: Vulnerability Assessment using Honepots. K.G. Saur Verlag, München (2004)

    Google Scholar 

  15. Koch, B.A.: The principles of european tort law. ERA Forum 8, 107–124 (2007). Springer-Verlag

    Article  Google Scholar 

  16. Enisa: Technical Guideline for Minimum Security Measures. Guidance on the security measures in Article 13a (2011)

    Google Scholar 

  17. Haapio, H.: Introduction to proactive law: a business lawyer’s view. Stockholm Institute for Scandinavian Law 1999 (2010)

    Google Scholar 

  18. Decision BGH, Halzband, sp. zn. I ZR 114/06 (2006)

    Google Scholar 

  19. Cuckoo Sandbox project (2015). http://www.cuckoosandbox.org/. Accessed 28th January 2015

  20. Burstein, A.J., Aaron, J.: Conducting cybersecurity research legally and ethically. In: LEET, vol. 8, pp. 1–8 (2008)

    Google Scholar 

  21. Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006)

    Google Scholar 

  22. Krone, T.: High Tech Crime Brief. Australian Institute of Criminology, Canberra (2005). ISSN 1832–3413

    Google Scholar 

  23. Alata, E., et al.: Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2), 127–136 (2008)

    Google Scholar 

  24. Honeyd project (2015). http://www.honeyd.org/. Accessed 20th Febrary 2015

  25. Pisarcik, P., Sokol, P.: Framework for distributed virtual honeynets. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 324. ACM (2014)

    Google Scholar 

Download references

Acknowledgment

Paper is the result of the Project implementation: University Science Park TECHNICOM for Innovation Applications Supported by Knowledge Technology, ITMS: 26220220182, supported by the Research & Development Operational Programme funded by the ERDF. This paper is partially funded by the VVGS grant under contract No. VVGS-PF-2015-472.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pavol Sokol .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sokol, P., Andrejko, M. (2015). Deploying Honeypots and Honeynets: Issues of Liability. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19419-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19418-9

  • Online ISBN: 978-3-319-19419-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics