20-01-2012, 12:32 PM
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks
[attachment=16325]
Security a serious problem
Methods for detection/protection/defense:
-Firewall: The Traffic cop
-IDS: detection and alert
These have shortcomings:
-Internal threats
-Virus laden programs
-False Positives and False negatives