Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure

Juan Luis Martin Acal, Gustavo Romero López, Pablo Palacín Gómez, Pablo García Sánchez, Juan Julián Merelo Guervós, Pedro A. Castillo Valdivieso

2015

Abstract

When dealing with security concerns in the use of network infrastructures a good balance between security concerns and the right to privacy should be maintained. This is very important in scientific networks, because they were created with an open and decentralized philosophy, in favor of the transmission of knowledge, when security was not a essential topic. Although private and scientific information have an enormous value for an attacker, the user privacy for legal and ethical reasons must be respected. Thus, passive detection methods in cybersecurity such as honeypots are a good strategy to achieve this balance between security and privacy in the defense plan of a scientific network. In this paper we present the practical case of the University of Granada in the application of honeypots for the detection and study of intrusions, which avoid intrusive techniques such as the direct analysis of the traffic through networking devices.

Download


Paper Citation


in Harvard Style

Martin Acal J., Romero López G., Palacín Gómez P., García Sánchez P., Merelo Guervós J. and Castillo Valdivieso P. (2015). Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure . In Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA, ISBN 978-989-758-157-1, pages 313-318. DOI: 10.5220/0005620203130318

in Bibtex Style

@conference{ecta15,
author={Juan Luis Martin Acal and Gustavo Romero López and Pablo Palacín Gómez and Pablo García Sánchez and Juan Julián Merelo Guervós and Pedro A. Castillo Valdivieso},
title={Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure},
booktitle={Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA,},
year={2015},
pages={313-318},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005620203130318},
isbn={978-989-758-157-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA,
TI - Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure
SN - 978-989-758-157-1
AU - Martin Acal J.
AU - Romero López G.
AU - Palacín Gómez P.
AU - García Sánchez P.
AU - Merelo Guervós J.
AU - Castillo Valdivieso P.
PY - 2015
SP - 313
EP - 318
DO - 10.5220/0005620203130318