Title: Honeypot technologies and their applicability as a strategic internal countermeasure

Authors: Craig Valli

Addresses: School of Computer and Information Science, Edith Cowan University, 2 Bradford Street, Mount Lawley, WA 6050, Australia

Abstract: Honeypot technologies are proving successful in mitigating against external attackers and there is significant literature for their deployment and development as external facing countermeasures. Very little research has been done on their suitability or adaptability as an internally deployed countermeasure. This paper explores issues with the deployment and design of honeypot technologies as an internal countermeasure to insider malfeasance.

Keywords: honeypot technologies; insiders; countermeasures; internal attacks; information security; computer security; insider malfeasance.

DOI: 10.1504/IJICS.2007.015503

International Journal of Information and Computer Security, 2007 Vol.1 No.4, pp.430 - 436

Published online: 22 Oct 2007 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article