This tutorial will cover in depth examples of use in corporate environments, including low interaction honeypot to gather statistics on malicious activities (worms & viruses ), wifi honeypots, fully operational architectures
Some demonstrations will be done during the tutorial, presenting most useful resources and open source projects (honeyd, sebek, mwcollect ).
Good interaction with the audience is expected.
Last updated: July 12, 2006
Size: 4.92 Mb
Authors & presenters
Franck Veysset (France Télécom R&D, FR) Laurent Butti (France Télécom R&D, FR)