Design and requirements to build a honeypot

Forensic analysis honeypots, which can capture and isolate the malware or hacker tools

The honeypots should mimic mail-server and web server

The honeypot should collect all the attacks being used against the domain (.nl) on which it is installed

It should be a Low-interaction honeypot to simulate the services commonly requested by attackers.

The honeypot will be placed on the internet on a dedicated public IP

The honeypot should be based on emulation software

The honeypot should be built with open source tools and software’s

The article should recommend which monitoring and alerting tools to use based on the previous mentioned criteria




Sample Solution

find the cost of your paper