a collection of networked machines, running stock operating systems, protected by a firewall
a computer, or group of computers, designed to be attacked for research and attack detection purposes
a group of honeypots scattered over the Internet to maximise the chance of capturing hacker tools and techniques
a high-interaction honeypot, meaning it provides real operating systems for attackers to interact with
a honeypot with added technology that records the hacker's actions while simultaneously minimizing or eliminating the risks to others on the Internet
a laboratory network of computers set up to attract and study Internet viruses and hackers in the wild
a network containing honeypots
a network designed to be compromised
a network of computers setup with software to act like they are vulnerable so that they can gather information about the attacker
a network of honeypots set up to imitate a real network
a network of production systems
a network that has no real purpose, other then to capture unauthorized activity
a network with no operational function other than attracting attackers to gain insight into their latest tools and methods
a research tool consisting of a network specifically designed for the purpose of being compromised, with control mechanisms that prevent this network from being used as a base for launching attacks against other networks
a system that tracks the attacks and actions of an intruder
A false production network, actually a system that mimics network activity so that remote users will be deceived into believing that they are accessing a genuine network. Because the honeynet is only a lure, any traffic that discovers it and requests service is inherently suspicious.
A group of honeypots on a network. Some software packages allow an entire network of computers to be hosted on a single machine with the specific purpose of investigating how it is exploited.
The Honeynet Project describes itself as ?a non-profit volunteer research organisation dedicated to improving the security of the Internet.? One of its main tools is the honeynet, which is a network of honeypots.
Two or more honeypots on a network form a honeynet. Typically, a honeynet is used for monitoring a larger and/or more diverse network in which one honeypot may not be sufficient. Honeynets and honeypots are usually implemented as parts of larger network intrusion-detection systems.