{"title":"蜜网维护程序和工具","authors":"C.H.P.C. Chaves, L. Franco, A. Montes","doi":"10.1109/IAW.2005.1495960","DOIUrl":null,"url":null,"abstract":"As part of an effort to improve honeynet's maintenance process, several procedures and tools automating high-interaction honeypot management tasks have been developed. Among the advantages of the adoption and use of these procedures and tools are the documentation of the maintenance procedures, the standardization of the collected data structure, the elimination of errors during the maintenance of honeypots, the automatization of the tasks that are executed and the reduction of the time between the deactivation and activation of a compromised honeypot.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Honeynet maintenance procedures and tools\",\"authors\":\"C.H.P.C. Chaves, L. Franco, A. Montes\",\"doi\":\"10.1109/IAW.2005.1495960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As part of an effort to improve honeynet's maintenance process, several procedures and tools automating high-interaction honeypot management tasks have been developed. Among the advantages of the adoption and use of these procedures and tools are the documentation of the maintenance procedures, the standardization of the collected data structure, the elimination of errors during the maintenance of honeypots, the automatization of the tasks that are executed and the reduction of the time between the deactivation and activation of a compromised honeypot.\",\"PeriodicalId\":252208,\"journal\":{\"name\":\"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAW.2005.1495960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As part of an effort to improve honeynet's maintenance process, several procedures and tools automating high-interaction honeypot management tasks have been developed. Among the advantages of the adoption and use of these procedures and tools are the documentation of the maintenance procedures, the standardization of the collected data structure, the elimination of errors during the maintenance of honeypots, the automatization of the tasks that are executed and the reduction of the time between the deactivation and activation of a compromised honeypot.