{"title":"互联网蜜罐:保护还是诱捕?","authors":"Brian Scottberg, W. Yurcik, D. Doss","doi":"10.1109/ISTAS.2002.1013842","DOIUrl":null,"url":null,"abstract":"A honeypot is a decoy computer system designed to look like a legitimate system an intruder will want to break into while, unbeknownst to the intruder, they are being covertly observed. Honeypots are effective precisely because attackers do not know if they are there and where they will be. However, honeypots are also a controversial technique; they essentially bait and capture intruders skirting the fine line between keeping attackers out of a network versus inviting them in. Little legal precedent has been established. Some see them as unfair entrapment tools while others see them as an effective data gathering and deterrence mechanism. This paper attempts to flush out the issues on both sides of a technique that may become ubiquitous in the future.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"47","resultStr":"{\"title\":\"Internet honeypots: protection or entrapment?\",\"authors\":\"Brian Scottberg, W. Yurcik, D. Doss\",\"doi\":\"10.1109/ISTAS.2002.1013842\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A honeypot is a decoy computer system designed to look like a legitimate system an intruder will want to break into while, unbeknownst to the intruder, they are being covertly observed. Honeypots are effective precisely because attackers do not know if they are there and where they will be. However, honeypots are also a controversial technique; they essentially bait and capture intruders skirting the fine line between keeping attackers out of a network versus inviting them in. Little legal precedent has been established. Some see them as unfair entrapment tools while others see them as an effective data gathering and deterrence mechanism. This paper attempts to flush out the issues on both sides of a technique that may become ubiquitous in the future.\",\"PeriodicalId\":377470,\"journal\":{\"name\":\"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-08-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"47\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAS.2002.1013842\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAS.2002.1013842","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A honeypot is a decoy computer system designed to look like a legitimate system an intruder will want to break into while, unbeknownst to the intruder, they are being covertly observed. Honeypots are effective precisely because attackers do not know if they are there and where they will be. However, honeypots are also a controversial technique; they essentially bait and capture intruders skirting the fine line between keeping attackers out of a network versus inviting them in. Little legal precedent has been established. Some see them as unfair entrapment tools while others see them as an effective data gathering and deterrence mechanism. This paper attempts to flush out the issues on both sides of a technique that may become ubiquitous in the future.