Honeynet Project

The Honeynet Project is an international security research[1] organization, "dedicated to investigating the latest attacks, developing open source security tools to improve Internet security and learning how malicious hackers behave." With Chapters around the world, The Project volunteers have contributed to fight against malware (such as Confickr), discovered new attacks and created security tools used by businesses and government agencies. After pioneering the use of honeynet technologies more than 10 years ago, the organization continues to be on the cutting edge of security research by working to analyze the latest attacks and educating the public about threats to information systems across the world. The project itself is a 501(c)(3) non-profit organization.

History

The Honeynet Project began in 1999 as a small mailing list of a group of people. Over time, the group expanded and officially dubbed itself as the Honeynet Project in June 2000. Today it includes dozens of active chapters around the world,[2] including Brazil, Indonesia, Greece, India, Mexico, Iran, Australia, Ireland, and many in the United States. This gives the Project a more global approach to gathering its research and raising the awareness of information security.

The Project's Goals

The Honeynet Project focuses on three primary goals. The first is to raise awareness of the existing threats on the Internet. The second goal is to conduct research covering data analysis approaches, unique security tool development and gathering data about attackers and malicious software they use. The third goal is to provide the tools[3] and techniques used by the Honeynet Project so that other organizations can benefit.[4]

Research and Development

The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, unique security tool development and gathering data about attackers and malicious software they use. The Project research provides critical additional information, such as their motives in attacking, how they communicate, when they attack systems and their actions after compromising a system. Such information is provided through Know Your Enemy whitepapers, The Project blog posts and Scan of the Month / Forensic challenges.

The project uses normal computers, without any known vulnerabilities,[5] and monitors the network for attacks.

References

  1. Schneier, Bruce (15 June 2001). "Honeypots and the Honeynet Project". Crypto-Gram. Retrieved 27 October 2014.
  2. Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30.
  3. Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30.
  4. About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30.
  5. Johnson, Keith (19 December 2000). "Hackers caught in security 'honeypot'". ZDNet. Archived from the original on 10 February 2001.

External links

Notes

This article is issued from Wikipedia - version of the 9/8/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.