Honeypots and honeynets: issues of privacy

نویسندگان

  • Pavol Sokol
  • Jakub Mísek
  • Martin Husák
چکیده

Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered. In this paper, we outline the privacy issues of honeypots and honeynets with respect to their technical aspects. The paper discusses the legal framework of privacy and legal grounds to data processing. We also discuss the IP address, because by EU law, it is considered personal data. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Collection and Data Analysis in Honeypots and Honeynets

Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...

متن کامل

Vulnerability Assessment using Honeypots

Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data c...

متن کامل

HIDEF: a Data Exchange Format for Information Collected in Honeypots and Honeynets

The deployment of honeypots is one of the methods used to collect data about attack trends in computer networks. The lack of a standard format for data representation makes the exchange and centralization of data generated by different technologies difficult. This also restricts the correlation and analysis of this information. This paper presents the HIDEF (Honeypots Information and Data Excha...

متن کامل

White Paper: .“Honeypot, Honeynet, Honeytoken: Terminological issues.”

Many different terms, definitions and classifications for honeypots, honeynets and other honeytokens have been proposed by several authors during the last 3 years. In this document, we offer a summary of the various proposals and we discuss their advantages and drawbacks. We also offer our own definition at the end of the paper.

متن کامل

Measuring Security Threats with Honeypot Technology

Honeypots are electronic baits, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system behavior and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Through the wealth of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Information Security

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017