Chapter 5. Solutions in this chapter:

  • Herding of Sheep
  • Detecting the Attack
  • How to Set Up a Realistic Environment
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

Honeypots are used to attract would be attackers in the interest of learning something about them. The honeypot appears to be a server with one or more vulnerabilities that the attacker can exploit. They can be as simple as a default installation of your favorite operating system or a complex network involving multiple servers and full implementations of fake traffic to make it appear as though the environment is as real as possible.

Honeypots can be set in a variety of locations. They are often set up as Internet accessible boxes. University projects often ...

Get Virtualization for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.