Enisa honeypots study

Page 53

52

Proactive Detection of Security Incidents Honeypots Support: Poor The honeypot is not being developed nor maintained. The last release was in 2007. There is no active mailing list. Costs: High $$$ The toolkit is freely available as Open Source. Installation of HiHAT requires a significant amount of work: either installation of old versions of dependent software or modification of its source code. Setting up the web application to work as a honeypot can be time consuming. The tool is not maintained, therefore potential bugs will not be resolved. Usefulness for CERTs: Useful HiHAT provides valuable information on the attacks on websites; however, this comes at a significant effort.

Figure 9: HiHAT in operation (screenshot)


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.