ABSTRACT

This chapter discusses honeypot (and honeynet) basics and definitions, and then outlines important

implementation and setup guidelines. It also describes some of the security lessons a company can derive

from running a research honeypot, based on this author’s experience running a research honeypot. This

chapter also provides insight into the techniques of attackers and concludes with considerations useful

for answering the question, “Should your organization deploy a honeynet?”