dfm covers
 
 

Cloud-Based Honeypots

Written by Matthew Isbell


Cloud-Based Honeypots

Introducing honeypots as a tool for the forensic practitioner’s toolbox showing how to deploy a simple cloud-based honeypot and our results after one month.


Honeypots are generally regarded as a tool of the security practitioner and researcher but they also offer advantages that forensic practitioners will find valuable. A honeypot is a system designed to attract adversaries and monitor interactions. Honeypots have no legitimate use and so inter actions are considered illegitimate. Interactions include keystrokes, network activity and more. They are a useful way to learn about adversaries by offering a view of their motives, tools, techniques and operational capability. By luring in adversaries they also deflect attacks from production infrastructure and give insight to attacks that might be used against these systems.




Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 30 on sale from February 2016:


Human Aspects of Security
This feature article is all about how today’s advanced attacks focus more on exploiting human flaws than system flaws. This article presents original field research using data gathered from products deployed around the world.  Read More »

Recent Advances in Forensic Radiology
This article describes all the recent advancements done till now in the field of forensic radiology.. Read More »

Subscribe today


BitCoin Targeted Phishing
This feature article is all about BitCoin and a Phishing attack. The article will explain what BitCoin is and how this Phishing attack was targeted at BitCoin. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue