Our organization is looking to proactively identify network intrusions, and we've experimented with a number of...
methods. One that we're probably going to continue is combining a honeypot in the DMZ with an IDS. Are there better low-budget methods for spotting network intrusions?
I strongly endorse the use of an intrusion detection system (IDS) or intrusion prevention system (IPS) on your network. This proven technology can help weed out malicious traffic that could jeopardize your network. For more on this topic, I suggest that you read my tip: Network intrusion prevention systems: Should enterprises deploy now?
From the editors: More on sidebars
Read an excerpt from Virtual Honeypots: From Botnet Tracking to Intrusion Detection.
Honeypots, on the other hand, are dangerous. Ask yourself seriously why you'd want to put a system on your network that is intended to be attacked. Honeypots are implemented with intentional vulnerabilities so that an attacker's activities and methods can be studied. The resulting information can be used to increase network security. But what if something goes wrong with the honeypot configuration, and the attacker is able to gain access to your network? How would you explain that to management? Putting up a honeypot is akin to hanging a sign inviting hackers to attempt to penetrate the network. Unless you're working for a firm specializing in security research, I wouldn't touch that one with a ten-foot pole.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Mike Chapple
A proposed cyberattack information database in the U.K. aims to improve cyberinsurance. Expert Mike Chapple explains what collecting data breach ...continue reading
The proposed CFTC regulations on cybersecurity testing are set to finalize in 2016. Expert Mike Chapple discusses the effects these regulations have ...continue reading
Whether Apple is a HIPAA covered entity was called into question when it advertised for a health regulations lawyer. Expert Mike Chapple discusses ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.