Loading...

Developing and Prototyping Honeypots

Description

Year: 2023

The Duke IT Security Office (ITSO) uses “honeypots” to develop actionable threat intelligence. A honeypot, as defined by techtarget.com, “is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems" (see https://www.techtarget.com/searchsecurity/definition/honey-pot).

A team of students will work with Duke’s ITSO to explore a set of applications as candidates for new network honeypot types. By analyzing network traffic and potential security vulnerabilities in these applications, students will use these examples to design a framework for rapid development and prototyping of new honeypots.

Watch the team's final presentation on YouTube.

Image
screenshot of command line telnet session

Team

Members

Leaders

IT Professionals

Student Project Managers/Facilitators

Sponsors

Cisco


Categories

2023