ABSTRACT

This chapter discusses honeypot (and honeynet) basics and definitions, and then outlines important implementation and setup guidelines. It also describes some of the security lessons a company can derive from running a research honeypot, based on this author’s experience running a research honeypot. This chapter also provides insight into the techniques of attackers and concludes with considerations useful for answering the question, “Should your organization deploy a honeynet?”