Re: [OT]Re: intrusion detection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Monday 19 April 2004 4:54 pm, Michael Gale wrote:

> I have also thought about a internal machine (not sure of the technical name
> for it)

Honeypot or honeynet (depending on whether there's one or several machines 
involved).

> to act as a live bit box. I believe the theory is that you leave a internal
> box a little open or un-patched with bogus data on it, this is used to
> attract the attacker and trigger other bells and whistles.

Regards,

Antony.

-- 
Behind the counter a boy with a shaven head stared vacantly into space,
a dozen spikes of microsoft protruding from the socket behind his ear.

 - William Gibson, Neuromancer (1984)

                                                     Please reply to the list;
                                                           please don't CC me.



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux