U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Use of Honeynets to Increase Computer Network Security and User Awareness

NCJ Number
Journal of Security Education Volume: 1 Issue: 2/3 Dated: 2005 Pages: 23-37
Sven Krasser; Julian B. Grizzard; Henry L. Owen; John G. Levine
Date Published
15 pages
This paper addresses how honeynets, networks of computers intended to be compromised, can be used to increase network security in large organizational environments.
Honeynets can be used to increase security awareness and network security in a university environment. The honeynets have been successfully used at the Georgia Institute of Technology. It has proven to be of great value to network administrators, students, and researchers. Over a thousand allegedly compromised machines on campus were detected, helping administrators to keep the network secure and users aware of their compromised systems. A honeynet is a network of honeypots. A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource, i.e., a honeypot is a resource that is intended to be compromised. A honeynet can provide the system administrator with intelligence about vulnerabilities and compromises within the network. Deploying honeynets gives attackers vulnerable systems to attack. These systems are monitored closely and the behavior of the attackers is studied. This paper outlines the current threat Internet security is facing, how honeynets can be used to learn about those threats. The paper investigates issues researchers have to take into account before deploying or while running a honeynet. Lastly, it describes how honeynet research was tied into computer security classes at Georgia Tech. 1 figure, 13 notes


No download available