The Value of Honeypots, Part One: Definitions and Values of Honeypots

by Lance Spitzner
Sept. 24, 2017 0 comments Symantec Detection & Response honeypot

Over the past several years there has been a growing interest in honeypots and honeypot-related technologies. Honeypots are not a new technology, they were first explained in a couple of very good papers by several icons in computer security: Cliff Stoll's book "The Cuckoo's Egg", and Steve Bellovin and Bill Cheswick's "An Evening with Berferd." This two-part series will attempt to take these works further and discuss what honeypots are, how they can add value to an organization, and several honeypot solutions. There are a variety of misconceptions on what a honeypot is, how it works, and how it adds value. It is hoped that this series will help clear up these issues.