Skip to main content

2015 | OriginalPaper | Buchkapitel

Deploying Honeypots and Honeynets: Issues of Liability

verfasst von : Pavol Sokol, Maroš Andrejko

Erschienen in: Computer Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Honeypots and honeynets are common tools for network security and network forensics. The deployment and usage of these tools is affected by a number of the technical and legal issues. It is very important to consider both issues together. Therefore, paper outlines technical aspects of honeynet and discusses the liability of honeypot’s and honeynet’s administrator. Paper deals with civil and criminal liability. Also paper focuses on cybercrime and liability of attackers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Heidelberg (2014) CrossRef Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Heidelberg (2014) CrossRef
2.
Zurück zum Zitat Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15–23. IEEE (2004) Spitzner, L.: The honeynet project: trapping the hackers. In: IEEE Security and Privacy Conference, 2004, pp. 15–23. IEEE (2004)
3.
Zurück zum Zitat The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison-Wesley, Boston (2004) The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison-Wesley, Boston (2004)
4.
Zurück zum Zitat Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1–6. IEEE, Australasian (2009) Abbasi, F., Harris, R.: Experiences with a generation III virtual honeynet. In: Telecommunication Networks and Applications Conference (ATNAC) 2009, pp. 1–6. IEEE, Australasian (2009)
5.
Zurück zum Zitat Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 21–28. IEEE (2005) Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 21–28. IEEE (2005)
6.
Zurück zum Zitat Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security (ICCCS 2011), pp. 600–605. ACM (2011) Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security (ICCCS 2011), pp. 600–605. ACM (2011)
7.
Zurück zum Zitat Vrable, M., et al.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ACM SIGOPS Operating Syst. Rev. 39(5), 148–162 (2005) Vrable, M., et al.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ACM SIGOPS Operating Syst. Rev. 39(5), 148–162 (2005)
8.
Zurück zum Zitat Husak, M., Vizvary, M.: POSTER: reflected attacks abusing honeypots. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1452. ACM (2013) Husak, M., Vizvary, M.: POSTER: reflected attacks abusing honeypots. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1452. ACM (2013)
9.
Zurück zum Zitat Martin, E.A., Law, J. (eds.): A Dictionary of Law. Oxford University Press, Oxford (1997) Martin, E.A., Law, J. (eds.): A Dictionary of Law. Oxford University Press, Oxford (1997)
10.
Zurück zum Zitat Black, H.C., Garner, B.A.: Black’s Law Dictionary. West Publishing Company, USA (1999) Black, H.C., Garner, B.A.: Black’s Law Dictionary. West Publishing Company, USA (1999)
11.
Zurück zum Zitat Scottberg, B., Yurcik, W., Doss, D.: Internet honeypots: protection or entrapment? In: International Symposium on Technology and Society, (ISTAS 2002), pp. 387–391. IEEE (2002) Scottberg, B., Yurcik, W., Doss, D.: Internet honeypots: protection or entrapment? In: International Symposium on Technology and Society, (ISTAS 2002), pp. 387–391. IEEE (2002)
12.
Zurück zum Zitat Mokube, I.: Honeynets - concepts, approaches and challenges. In: Proceedings of the 45th Annual Southeast Regional Conference, pp. 321–326. ACM (2007) Mokube, I.: Honeynets - concepts, approaches and challenges. In: Proceedings of the 45th Annual Southeast Regional Conference, pp. 321–326. ACM (2007)
13.
Zurück zum Zitat Rubin, B., Cheung, D.: Computer security education and research: handle with care. In: Security and Privacy, pp. 56–59. IEEE (2006) Rubin, B., Cheung, D.: Computer security education and research: handle with care. In: Security and Privacy, pp. 56–59. IEEE (2006)
14.
Zurück zum Zitat Dornseif, M., Gärtner, F.C., Holz, T.: Vulnerability Assessment using Honepots. K.G. Saur Verlag, München (2004) Dornseif, M., Gärtner, F.C., Holz, T.: Vulnerability Assessment using Honepots. K.G. Saur Verlag, München (2004)
15.
Zurück zum Zitat Koch, B.A.: The principles of european tort law. ERA Forum 8, 107–124 (2007). Springer-VerlagCrossRef Koch, B.A.: The principles of european tort law. ERA Forum 8, 107–124 (2007). Springer-VerlagCrossRef
16.
Zurück zum Zitat Enisa: Technical Guideline for Minimum Security Measures. Guidance on the security measures in Article 13a (2011) Enisa: Technical Guideline for Minimum Security Measures. Guidance on the security measures in Article 13a (2011)
17.
Zurück zum Zitat Haapio, H.: Introduction to proactive law: a business lawyer’s view. Stockholm Institute for Scandinavian Law 1999 (2010) Haapio, H.: Introduction to proactive law: a business lawyer’s view. Stockholm Institute for Scandinavian Law 1999 (2010)
18.
Zurück zum Zitat Decision BGH, Halzband, sp. zn. I ZR 114/06 (2006) Decision BGH, Halzband, sp. zn. I ZR 114/06 (2006)
20.
Zurück zum Zitat Burstein, A.J., Aaron, J.: Conducting cybersecurity research legally and ethically. In: LEET, vol. 8, pp. 1–8 (2008) Burstein, A.J., Aaron, J.: Conducting cybersecurity research legally and ethically. In: LEET, vol. 8, pp. 1–8 (2008)
21.
Zurück zum Zitat Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006) Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006)
22.
Zurück zum Zitat Krone, T.: High Tech Crime Brief. Australian Institute of Criminology, Canberra (2005). ISSN 1832–3413 Krone, T.: High Tech Crime Brief. Australian Institute of Criminology, Canberra (2005). ISSN 1832–3413
23.
Zurück zum Zitat Alata, E., et al.: Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2), 127–136 (2008) Alata, E., et al.: Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2), 127–136 (2008)
25.
Zurück zum Zitat Pisarcik, P., Sokol, P.: Framework for distributed virtual honeynets. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 324. ACM (2014) Pisarcik, P., Sokol, P.: Framework for distributed virtual honeynets. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 324. ACM (2014)
Metadaten
Titel
Deploying Honeypots and Honeynets: Issues of Liability
verfasst von
Pavol Sokol
Maroš Andrejko
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19419-6_9

Premium Partner