Honeypots: Defendiendo proactivamente a la comunidad

Security Workshop - 5th Colaris (Day 2)

Wednesday — October 21st, 2009 15:15

Honeypots have long been an important tool for researchers and the Security community in general. Based on an almost trivial hypothesis (that if you have a computer system connected to the Internet with no production services on it, then all traffic it receives is by default malicious), honeypots can provide a wealth of information regarding atacker's strategies, tools and targets. Moreover, they are cheap and easy to build. Even old servers and virtual machines can be succesfully used as honeypots.

This talk will introduce the topic of honeypots and honeynets and then present CSIRT-ANTEL's experience in taking the information collected by honeypots and using it to provide a proactive alert service for its constituency, closing with some real-incident experiences.

Note:Talk will be presented in Spanish with slides in English.

Presenters

  • Carlos Martínez (CSIRT ANTEL, UY) UY

    He is an Electrical Engineer from Uruguay with more than 10 years of experience in the Telecommunications market. He started working in Operations and Management of IP networks and gradually transitioned to Computer Security. Since 2005 he has been working exclusively in the field of computer security for CSIRT-ANTEL, the computer security incident response team of ANTEL (the largest telecom operator in Uruguay). Since 2007 Carlos has been the chair of the Network Security mailing list and Network Security Forum; both hosted by LACNIC.

    Carlos also teaches classes on Computer Security and Computer Networking for both the Computer Science Institute of Universidad de la Republica and Universidad de Montevideo.

    His current research interests include honeypots, honeynets, security in IPv6, and secure, automated security information sharing across administrative boundaries.