In this paper, we report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned Avenues for future work are also proposed.
|Original language||English (US)|
|Title of host publication||Proceedings - IEEE Pacific Rim International Symposium on Dependable Computing|
|Number of pages||6|
|State||Published - Jun 15 2004|