1 / 6

Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon Matt Rixon

2004-2005 University of Florida Integrate Product and Process Design (IPPD) Program on Wireless Honeypots. Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon.com Matt Rixon Matthew_C_Rixon@raytheon.com September 17, 2004. Introduction. Purpose

turner
Télécharger la présentation

Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon Matt Rixon

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2004-2005 University of Florida Integrate Product and Process Design (IPPD) Program on Wireless Honeypots Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon.com Matt Rixon Matthew_C_Rixon@raytheon.com September 17, 2004

  2. Introduction • Purpose • This presentation will serve as a list of possible activities for research on wireless honeypots. • Target Audience • This presentation is targeted to technical forums and the IPPD team.

  3. Raytheon Contacts • Randall Brooks • 727-302-4103 (office) • Randall_S_Brooks@raytheon.com • Matt Rixon • 727-302-2233 (office) • Matthew_C_Rixon@raytheon.com • Dr. Al Nauda • 727-302-4708 (office) • 727-302-4801 (fax) • Al_Nauda@raytheon.com • Jon Goding • 727-302-3488 (office) • 727-698-0702 (mobile) • Jon_D_Goding@raytheon.com

  4. Wireless Honeypots • Create and setup your own wireless honeypot • What modifications did you do? Did you write any special software? • How could this be used to “slow down” an attack? • What did you see? • What scenarios could this apply to? • How could this apply to the use of autonomous drones in the military? • Legal Issues • Are banners enough? • Can you prosecute the attacker? Is the data obtained admissible in court? • How could an attacker refute the evidence? • How would you feel if you were being prosecuted with evidence collected from a wireless honeypot?

  5. Expectations • Weekly telecons to discuss progress and issues • can be more frequent if necessary • Wed 9 a.m. • Requirements documentation • Architecture documentation • Schedule and cost reports • Data package delivery (software) • Final visit and presentation at the end of the project to be conducted here at Raytheon • The creation of at least 1 working wireless honeypot that differs than one that can be downloaded from the Internet. • Report on legal issues

  6. Wireless Honeypot References • “Wireless Honeypot Trickery” by Laurent Oudot http://www.securityfocus.com/infocus/1761 • Honeyd Project http://honeyd.org/ • “Use a Honeypot, Go to Prison?” By Kevin Poulsen http://www.securityfocus.com/news/4004 • “Honeypots: Are They Legal?” by Lance Spitzner http://www.securityfocus.com/infocus/1703 • http://labrea.sourceforge.net/labrea-info.html

More Related