* First in a series on honeypots - definition Norwich University undergraduate student Bob Pelletier is doing some interesting research work on honeypots in the independent study program with me this term in which he is building a working honeypot system using virtual machines. He has very kindly allowed me to publish his work here as part of the ongoing series. As usual, I’ve made some minor edits for the new context, but all of the following is Bob’s own writing.* * *Malicious hackers (blackhats) continuously try to breach security measures to gain access to protected information. To help better understand the methods used by the blackhat community, a new tool has been developed: the honeypot.The use of honeypots has caused a heated debate within the security field. Many question the legality and ethics of such a system. This series of articles outlines the basic legal issues surrounding honeypots as well as some ethical issues to ponder. A honeypot is any system designed for the sole purpose of being exploited. This is a broad definition that can be implemented in many ways. Some honeypot systems use software, some use actual production machines, and some even use virtual machines such as with VMware. Whichever honeypot design method is chosen, the underlying goal is to create a system that appears to be vulnerable.What makes a honeypot different from other vulnerable computer systems is its extensive logging capability. The systems most often include at least four layers of logging to capture attacker activity. Every file accessed, every connection made, every keystroke an attacker makes on a honeypot is logged to a secure location. The advantage of logging attacker activity is the chance to get an inside view of the blackhat community’s methodology. Learning common methods and attack tools of attackers can aid security experts in designing new protection measures. Studying attack trends can also help predict future attacks. The Honeynet Project founded by Lance Spitzner demonstrates the usefulness of honeypots as a research tool.Honeypots are not only used for research purposes, but also for production. Implementing a honeypot within a company can create a type of intrusion detection system. The design of a honeypot suggests that any connection attempts made with the system are unauthorized. This is because normal business functions do not use the honeypot; only an attacker would be attempting to use the system. Therefore, activity on a honeypot can alert an organization that an attacker is present. From there a company can close the security hole used by the attacker, investigate the incident, and possibly press charges.* * *In the next articles in this series, Bob Pelletier ( mailto:pelletib@norwich.edu ) looks at some of the legal issues surrounding the use of honeypots. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Technology Industry Markets news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Network Security Networking news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe