𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Intrusion Detection Honeypots: Detection through Deception

✍ Scribed by Chris Sanders


Publisher
Applied Network Defense
Year
2021
Tongue
English
Leaves
302
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The foundational guide for using deception against computer network adversaries.

When an attacker breaks into your network, you have a home-field advantage. But how do you use it?

Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring honeypots -- security resources whose value lies in being probed and attacked. These fake systems, services, and tokens lure attackers in, enticing them to interact. Unbeknownst to the attacker, those interactions generate logs that alert you to their presence and educate you about their tradecraft. Intrusion Detection Honeypots teaches you how to: - Use the See-Think-Do framework to integrate honeypots into your network and lure attackers into your traps.

  • Leverage honey services that mimic HTTP, SSH, and RDP.
  • Hide honey tokens amongst legitimate documents, files, and folders.
  • Entice attackers to use fake credentials that give them away.
  • Create honey commands, honey tables, honey broadcasts, and other unique detection tools that leverage deception.
  • Monitor honeypots for interaction and investigate the logs they generate.


With the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals.


πŸ“œ SIMILAR VOLUMES


Secrets of Detecting Lies: Handbook for
✍ Doug Whetstone πŸ“‚ Library 🌐 English

<span>Human Lie Detection Expert Doug Whetstone Reveals the Biggest Secrets in Successfully Detecting Lies in any Situation, Without Equipment!</span><span><br><br>If you want to know when people are lying to you, this body language 101 book is for you! The book teaches all of the body language secr

Virtual Honeypots: From Botnet Tracking
✍ Niels Provos, Thorsten Holz πŸ“‚ Library πŸ“… 2007 πŸ› Addison-Wesley Professional 🌐 English

<p>Praise for <i> <b>Virtual Honeypots </b> </i> </p> <p> "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader’s eyes." </p> <p> β€”Lenny Zeltser, Information Security Practice Leader at Gemini Systems </p> <p> "This is one of

Virtual Honeypots: From Botnet Tracking
✍ Niels Provos, Thorsten Holz πŸ“‚ Library πŸ“… 2007 πŸ› Addison-Wesley Professional 🌐 English

<p>Praise for <b>Virtual Honeypots </p> <p> "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader’s eyes." </p> <p> β€”Lenny Zeltser, Information Security Practice Leader at Gemini Systems </p> <p> "This is one of the must-re

Deception Detection: Winning The Polygra
✍ Charles Clifton πŸ“‚ Library πŸ“… 1991 πŸ› Paladin Press 🌐 English

Fear is the polygrapher's most powerful weapon, but you can defend yourself! All it takes is a little know-how and some concentration and practice. Arm yourself with these proven effective tactics for rendering the polygrapher impotent in his efforts to intimidate and manipulate you, and learn how t

Understanding Intrusion Detection throug
✍ Stefan Axelsson, David Sands πŸ“‚ Library πŸ“… 2005 πŸ› Springer 🌐 English

In the beginning I was a bit mislead by the title of this book, but I guess that was my mistake: The book is not about visualizing intrusion detection system logs, but it is about how to do intrusion detection on mainly Web server logs. The book is based on some older papers of the author. However,