Abstract
Honeypots and honeynets are common tools for network security and network forensics. The deployment and usage of these tools is affected by a number of the technical and legal issues. It is very important to consider both issues together. Therefore, paper outlines technical aspects of honeynet and discusses the liability of honeypot’s and honeynet’s administrator. Paper deals with civil and criminal liability. Also paper focuses on cybercrime and liability of attackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Heidelberg (2014)
Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15–23. IEEE (2004)
The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison-Wesley, Boston (2004)
Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1–6. IEEE, Australasian (2009)
Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 21–28. IEEE (2005)
Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security (ICCCS 2011), pp. 600–605. ACM (2011)
Vrable, M., et al.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ACM SIGOPS Operating Syst. Rev. 39(5), 148–162 (2005)
Husak, M., Vizvary, M.: POSTER: reflected attacks abusing honeypots. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1452. ACM (2013)
Martin, E.A., Law, J. (eds.): A Dictionary of Law. Oxford University Press, Oxford (1997)
Black, H.C., Garner, B.A.: Black’s Law Dictionary. West Publishing Company, USA (1999)
Scottberg, B., Yurcik, W., Doss, D.: Internet honeypots: protection or entrapment? In: International Symposium on Technology and Society, (ISTAS 2002), pp. 387–391. IEEE (2002)
Mokube, I.: Honeynets - concepts, approaches and challenges. In: Proceedings of the 45th Annual Southeast Regional Conference, pp. 321–326. ACM (2007)
Rubin, B., Cheung, D.: Computer security education and research: handle with care. In: Security and Privacy, pp. 56–59. IEEE (2006)
Dornseif, M., Gärtner, F.C., Holz, T.: Vulnerability Assessment using Honepots. K.G. Saur Verlag, München (2004)
Koch, B.A.: The principles of european tort law. ERA Forum 8, 107–124 (2007). Springer-Verlag
Enisa: Technical Guideline for Minimum Security Measures. Guidance on the security measures in Article 13a (2011)
Haapio, H.: Introduction to proactive law: a business lawyer’s view. Stockholm Institute for Scandinavian Law 1999 (2010)
Decision BGH, Halzband, sp. zn. I ZR 114/06 (2006)
Cuckoo Sandbox project (2015). http://www.cuckoosandbox.org/. Accessed 28th January 2015
Burstein, A.J., Aaron, J.: Conducting cybersecurity research legally and ethically. In: LEET, vol. 8, pp. 1–8 (2008)
Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006)
Krone, T.: High Tech Crime Brief. Australian Institute of Criminology, Canberra (2005). ISSN 1832–3413
Alata, E., et al.: Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2), 127–136 (2008)
Honeyd project (2015). http://www.honeyd.org/. Accessed 20th Febrary 2015
Pisarcik, P., Sokol, P.: Framework for distributed virtual honeynets. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 324. ACM (2014)
Acknowledgment
Paper is the result of the Project implementation: University Science Park TECHNICOM for Innovation Applications Supported by Knowledge Technology, ITMS: 26220220182, supported by the Research & Development Operational Programme funded by the ERDF. This paper is partially funded by the VVGS grant under contract No. VVGS-PF-2015-472.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sokol, P., Andrejko, M. (2015). Deploying Honeypots and Honeynets: Issues of Liability. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-19419-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19418-9
Online ISBN: 978-3-319-19419-6
eBook Packages: Computer ScienceComputer Science (R0)