Honeypots for Windows (Books for Professionals by Professionals)

Part Three - Honeypot Operations
Honeypots for Windows
by Roger A. Grimes
Apress 2005

Chapter List

Chapter 9: Network Traffic Analysis
Chapter 10: Honeypot Monitoring
Chapter 11: Honeypot Data Analysis
Chapter 12: Malware Code Analysis

Part Overview

Part Three covers the ongoing tasks involved with collecting, deciphering, and understanding the information gathered from your honeypot. Chapter 9 covers network traffic analysis, using Snort and Ethereal as examples. Chapter 10 discusses the many different ways you can monitor real or emulated honeypots. Chapter 11 explains how to translate all the information you have collected into useful data. Chapter 12 ends the book by covering various advanced honeypot topics, such as antispam firewalls and honeytokens.

Категории