Deploying a University Honeypot: A case study

Research output: Contribution to journalConference article in JournalResearchpeer-review

1 Citation (Scopus)
20 Downloads (Pure)

Abstract

The cyber threat against all parts of our societies is con- stantly growing, and while some attacks are carried out by cyber crimi- nals for financial gains, others have strong strategic values and are likely to be carried out by nation state actors. One group of institutions that experience the growing cyber threat is universities: Universities are at- tractive targets because they often possess valuable research knowledge, and because universities traditionally have promoted an openness cul- ture. At the same time, they face challenges in maintaining a high level of cyber security, since many people have system and physical access, and because there are many legacy systems in use. In order to build an efficient cyber defense it is crucial to understand the always chang- ing threat picture, so the countermeasures can be adapted accordingly. However, doing so requires updated information about the attacks from a variety of sources. While many of these sources, e.g. threat assessment reports from intelligence agencies, come with regular intervals or in case of significant changes, this paper explores a way of getting real-time in- formation about current attack attempts towards a specific university: Honeypots. The paper contributes by discussing advantages and disad- vantages of different kinds of honeypots in a university setting, and it demonstrates how results can be achieved through actual honeypot im- plementations. Our conclusion is that honeypots are a valuable supple- ment to other sources of intelligence, but it is crucial to choose the right types and architectures.
Original languageEnglish
JournalCEUR Workshop Proceedings
Volume2443
Pages (from-to)27-38
Number of pages12
ISSN1613-0073
Publication statusPublished - Sep 2019
EventJoint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019) - Katowice, Poland
Duration: 23 Sep 201925 Sep 2019

Conference

ConferenceJoint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019)
CountryPoland
CityKatowice
Period23/09/201925/09/2019

Keywords

  • Honeypots
  • Cyber Security
  • Risk assessment
  • Universities

Fingerprint Dive into the research topics of 'Deploying a University Honeypot: A case study'. Together they form a unique fingerprint.

Cite this