[ieee 2005 9th ifip/ieee international symposium on integrated network management, 2005. im 2005. -...

1
Should We Share Honeypot Information for Security Management? Panel Leader: Felix Wu, University of California at Davis, USA Panelists: Marc Dacier, Eurecom, France Herve Debar, France Telecom, France Yao-Min Chen, Watchguard, USA Abstract It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the “honeypot”, a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed: (1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them? Panel Session 778

Upload: f

Post on 09-Mar-2017

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: [IEEE 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005. - Nice, France (15-19 May 2005)] 2005 9th IFIP/IEEE International Symposium on Integrated

Should We Share Honeypot Information for Security Management?

Panel Leader: Felix Wu, University of California at Davis, USA Panelists: Marc Dacier, Eurecom, France

Herve Debar, France Telecom, France Yao-Min Chen, Watchguard, USA

Abstract It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the “honeypot”, a virtual information playground that should only attract malicious/suspicious Internet users. Following topics will be addressed:

(1) What information can be collected by Honeypots? (2) How will the Honeypot information be useful for others in management? (3) What are the concerns in sharing them?

Panel Session 778