This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article contains content that is written like an advertisement. Please help improve it by removing promotional content and inappropriate external links, and by adding encyclopedic content written from a neutral point of view. (October 2014) (Learn how and when to remove this template message) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Honeynet Project" – news · newspapers · books · scholar · JSTOR (August 2018) (Learn how and when to remove this template message) (Learn how and when to remove this template message)
The Honeynet Project
AbbreviationTHP
Formation1999; 25 years ago (1999)
FounderLance Spitzner
Founded atAnn Arbor, Michigan
Type501(c)(3)
Registration no.36-4460128
Chairman
David Pisano
  • Jeff Nathan
  • Max Kilger
  • Daniel Haslinger
  • Sébastien Tricaud
  • Abhinav Saxena
  • Daniel Singh[1]
Websitewww.honeynet.org

The Honeynet Project is an international cybersecurity research organization that investigates the latest cyber attacks and develops open source tools to improve Internet security by tracking hackers' behavioral patterns.[2]

History

The Honeynet Project began in 1999 as a small mailing list of a group of people.[3][4] The group expanded and officially dubbed itself as The Honeynet Project in June 2000.[3]

The project includes dozens of active chapters around the world, including Brazil, Indonesia, Greece, India, Mexico, Iran, Australia, Ireland, and many in the United States.[5]

Project goals

The Honeynet Project has 3 main aims:[6]

Research and development

The Honeynet Project volunteers collaborate on security research efforts covering data analysis approaches, security tools development, and gathering data about hackers and malicious software. The Project research provides sensitive information regarding attackers, this includes this motives, communication methods, attack timelines and their actions following a system attack. This information is provided through Know Your Enemy white-papers, The Project blog posts, and Scan of the Month Forensic challenges.[6]

The project uses unmodified computers with the same specifications, operating systems and security as those used by many companies.[8] These computer production systems are added online and the network of volunteers scan the network for attacks or suspicious activity.[3] The finds are published on the company site for public viewing and knowledge.[8]

See also

References

  1. ^ "About Us – the Honeynet Project".
  2. ^ Schneier, Bruce (2001-06-15). "Honeypots and the Honeynet Project". Crypto-Gram. Retrieved 2014-10-27.
  3. ^ a b c Spitzner, L. (2003). "The Honeynet Project: Trapping the hackers". IEEE Security & Privacy. 1 (2): 15–23. doi:10.1109/MSECP.2003.1193207.
  4. ^ "Matteo Lodi – The Honeynet Project". Retrieved 2022-08-09.
  5. ^ Groups directory | The Honeynet Project. Honeynet.org. Retrieved on 2017-09-18 from http://www.honeynet.org/og Archived 2011-06-29 at the Wayback Machine.
  6. ^ a b About The Honeynet Project | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/about.
  7. ^ Projects | The Honeynet Project. Honeynet.org. Retrieved on 2013-10-30 from http://www.honeynet.org/project.
  8. ^ a b Johnson, Keith (2000-12-19). "Hackers caught in security 'honeypot'". ZDNet. Archived from the original on 2001-02-10.