Developing and Prototyping Honeypots
The Duke IT Security Office (ITSO) uses “honeypots” to develop actionable threat intelligence. A honeypot, as defined by techtarget.com, “is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems" (see https://www.techtarget.com/searchsecurity/definition/honey-pot).
A team of students will work with Duke’s ITSO to explore a set of applications as candidates for new network honeypot types. By analyzing network traffic and potential security vulnerabilities in these applications, students will use these examples to design a framework for rapid development and prototyping of new honeypots.
Student Project Managers/Facilitators