Sweetening Your Threat Intelligence with Automated Honeypots

No Thumbnail Available
If you need an accessible version of this item, please email your request to iusw@iu.edu so that they may create one and provide it to you.
Date
2018-06-28
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence.
Description
Keywords
Cybersecurity, Honeypot, Threat Intelligence
Citation
DOI
Link(s) to data and video for this item
Relation
Rights
Type
Presentation