Portable HoneyPot & HoneyNet: Within a Closed Network
Concepción Rivera, Héctor D.
MetadataShow full item record
At any given time a business network could be or has been compromised by a hacker or its information been exposed or breach. This is why building a honeypot and understanding how to use it can help network security expert, avoid being hack in the first or try to mitigate those attacks and breach. It also shows that this tools can be used for research purpose in a local home network for test and research. This paper will explain what honeypots and honeynets are, and the help of building one in a Microsoft environment using low cost tools and hardware and being portable. Key Terms - Hackers, Honeynets, Honeypots, Packets.