Portable HoneyPot & HoneyNet: Within a Closed Network
Abstract
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security expert, avoid being
hack in the first or try to mitigate those attacks and
breach. It also shows that this tools can be used for
research purpose in a local home network for test
and research. This paper will explain what
honeypots and honeynets are, and the help of
building one in a Microsoft environment using low
cost tools and hardware and being portable.
Key Terms - Hackers, Honeynets, Honeypots,
Packets.