Internet Threat Detection Using Honeypots

Internet Threat Detection Using Honeypots

Tomas Sochor (University of Ostrava, Czech Republic)
Release Date: August, 2015|Copyright: © 2016 |Runtime: 2 hrs 8 mins
EISBN13: 9781466695979|DOI: 10.4018/978-1-4666-9597-9
Institution (Multi User Access) Video Prices
Streaming Access:
$350.00
DVD:
$360.00
Individual (Single User Access) Video Prices
Streaming Access:
$175.00
DVD:
$185.00

Description

The internet has presented a vast number of opportunities to connect and communicate with individuals all over the world. This heightened connectivity has also brought about a number of security threats as criminals continue to find new ways to infiltrate the private data of corporations and individuals alike.

Internet Threat Detection Using Honeypots explores the techniques employed by honeypots intended to hinder the ability of cyber criminals to attack or otherwise gain unauthorized access to private data and systems. Focusing on practical implementations and recently detected internet threats, this video is an ideal educational resource and provides practical cyber security solutions to business professionals, IT specialists, students, and researchers on this topic.

Topics Covered

  • Cyber Security
  • Email Traps
  • Honeynets
  • Honeypot Detection
  • Low-Interaction Honeypots
  • Malware Honeypots

Table of Contents

Introduction and Biography
2:38 mins
Section 1:Honeypot Introduction
 
Lesson 1:Honeypot Types
16:52 mins
 
Lesson 2:Low-Interaction Honeypots and High-Interaction Honeypots
16:50 mins
 
Section 2:Internet Threats
 
Lesson 3:Types of Threats
14:43 mins
 
Lesson 4:Threat Detection Using Honeypots and Honeynets
13:08 mins
 
Section 3:Application of Honeypots in Real Networks
 
Lesson 5:Low-Interaction Honeypots and Their Operation
12:01 mins
 
Lesson 6:High-Interaction Honeypots and Their Operation
12:53 mins
 
Section 4:IPv6 Threats and Detection
 
Lesson 7:IPv6 Threats and Detection
13 mins
 
Section 5:Results from Experimental Honeynet
 
Lesson 8:Low-Interaction Honeypots
13 mins
 
Lesson 9:Detected Attacks Performed by Human Attackers**
6:04 mins
 
Lesson 10:Internet Threat Detection Using Honeypots
7:29 mins