Skip to main content

A Honeypot Deployment Plan

  • Chapter
Honeypots for Windows
  • 824 Accesses

Summary

Deploying a honeypot system requires methodical planning and understanding of your motivations for installing one in the first place. Basic underlying honeypot tenets must be considered during the design phase. You need to decide whether you want to implement a research or production honeypot, real or virtual, and where to place it. These decisions depend on your objectives and resources. Externally placed honeypot systems are the most exposed type of (research) honeypot and will gain the attention of hackers the quickest.

Production honeypots placed on the DMZ can warn you of malicious activity happening within your DMZ. Internally placed honeypot systems can act as an early-warning system to alert you that a threat has bypassed your other network security countermeasures, as well as alert you to internal attacks.

A honeypot system is a collection of components, including tools for alerting, monitoring, logging, and analyzing found data. Chapter 3 will cover the basic behaviors and services a Windows honeypot should mimic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Roger A. Grimes

About this chapter

Cite this chapter

(2005). A Honeypot Deployment Plan. In: Honeypots for Windows. Apress. https://doi.org/10.1007/978-1-4302-0007-9_2

Download citation

Publish with us

Policies and ethics