Honeynet Project
{{multiple issues|
{{Advert|date=October 2014}}
{{More citations needed|date=August 2018}}
}}
{{Infobox organization
| name = The Honeynet Project
| logo =
| map =
| map_size =
| map_alt =
| map_caption =
| map2 =
| map2_size =
| map2_alt =
| map2_caption =
| abbreviation = THP
| predecessor =
| merged =
| successor =
| formation = {{start date and age|1999}}
| founder = Lance Spitzner
| founding_location = Ann Arbor, Michigan
| extinction =
| merger =
| type = 501(c)(3)
| tax_id =
| registration_id = 36-4460128
| status =
| purpose =
| headquarters =
| location =
| coords =
| region =
| services =
| products =
| methods =
| fields =
| membership =
| membership_year =
| language =
| owner =
| sec_gen =
| leader_title = Chairman
| leader_name = Hugo Gascón
| leader_title2 = Chief Executive Officer
| leader_name2 = Emmanouil Vasilomanolakis
| leader_title3 =
| leader_name3 =
| leader_title4 =
| leader_name4 =
| board_of_directors = {{unbulleted list|Jeff Nathan|Max Kilger|David Pisano|Felix Leder|Hugo Gascón|Emmanouil Vasilomanolakis|Maximilian Hils{{Cite web | url=https://www.honeynet.org/about | title=About Us – the Honeynet Project}}}}
| key_people =
| main_organ =
| parent_organization =
| subsidiaries =
| secessions =
| affiliations =
| budget =
| budget_year =
| revenue =
| revenue_year =
| disbursements =
| expenses =
| expenses_year =
| endowment =
| endowment_year =
| staff =
| staff_year =
| volunteers =
| volunteers_year =
| website = {{URL|https://www.honeynet.org}}
| remarks =
| formerly =
| footnotes =
}}
The Honeynet Project is an international cybersecurity non-profit research organization that investigates new cyber attacks and develops open-source tools to help improve Internet security by tracking hackers' behavioral patterns.{{cite web |url=https://www.schneier.com/crypto-gram-0106.html#1 |title=Honeypots and the Honeynet Project |work=Crypto-Gram |first=Bruce |last=Schneier |author-link=Bruce Schneier |date=2001-06-15 |access-date=2014-10-27 }}
History
The Honeynet Project began in 1999 as a mailing list to a select few.{{cite journal | doi=10.1109/MSECP.2003.1193207 | title=The Honeynet Project: Trapping the hackers | year=2003 | last1=Spitzner | first1=L. | journal=IEEE Security & Privacy | volume=1 | issue=2 | pages=15–23 }}{{Cite web |title=Matteo Lodi – The Honeynet Project |url=https://www.honeynet.org/author/matteo-lodi/ |access-date=2022-08-09 |language=en-US |archive-date=2022-08-09 |archive-url=https://web.archive.org/web/20220809171318/https://www.honeynet.org/author/matteo-lodi/ |url-status=dead }} The group expanded and officially dubbed itself as The Honeynet Project in June 2000.
The project includes dozens of active chapters around the world, including Brazil, Indonesia, Greece, India, Mexico, Iran, Australia, Ireland, and many in the United States.Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from http://www.honeynet.org/og {{Webarchive|url=https://web.archive.org/web/20110629090644/http://honeynet.org/og |date=2011-06-29 }}.
Project goals
The Honeynet Project has 3 main aims:
- Raise awareness of the existing threats on the Internet.
- Conduct research covering data analysis approaches unique security tool development, and gathering data about attackers and malicious software they use.
- Provide the tools and techniques used by The Honeynet Project so other organizations can benefit.Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/project.About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/about.
Research and development
The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The group's research provides sensitive information regarding attackers. This includes their motives, communication methods, attack timelines, and actions following a system attack. This information is provided through Know Your Enemy white papers, The Project blog posts, and Scan of the Month Forensic challenges.
The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies.{{cite news|url=http://www.zdnet.com/zdnn/stories/news/0,4586,2666273,00.html |title=Hackers caught in security 'honeypot' |first=Keith |last=Johnson |publisher=ZDNet |date=2000-12-19 |archive-url=https://web.archive.org/web/20010210072408/http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2666273%2C00.html |archive-date=2001-02-10 |url-status = dead}} These computer production systems are added online and the network of volunteers scans the network for attacks or suspicious activity. The findings are published on the company site for public viewing and knowledge.
See also
References
{{Reflist|1}}
External links
- [http://www.honeynet.org Honeynet Project Home Page]
- [http://www.honeynet.org/blog Honeynet Project Blog]
Category:Computer network security
Category:501(c)(3) organizations
Category:Organizations established in 1999
Category:1999 establishments in Michigan
Category:Free software project foundations based in the United States