Menu
Cart 0
The Fifth HOPE (2004): "Retaliation With Honeypots" (Download)

The Fifth HOPE (2004): "Retaliation With Honeypots" (Download)

  • 099


Sunday, July 11, 2004: 10:00 am (Area "B"): Most of the time a honeypot is considered to be a security resource whose value lies in being probed, attacked, or compromised. The purpose of this talk is to explain how honeypots might be deployed not only to use passive defense technologies, but also active defense ones. As a specific example, think about what might happen the day honeypots are able to automatically strike back at an aggressor or a worm! Different technical possibilities offered to honeypots on the cyberwarfare field will be explored, such as playing with or even hacking back an usual aggressor (scanner, worm, exploit, client of a trojan, etc.), improving traceback capabilities to find the real source of an attack, etc. This will open up all kinds of legal implications which will also be discussed.

Hosted by Laurent Oudot