Methods of Allowing Access to Your Honeynet
This paper, released in 2003, was written during a time when swarms of network
security researchers were looking to honeypot research to help them get face to
face with the hacker community in a controller environment. “Methods of Allowing
Access to Your Honeynet” was designed to instruct aspiring IT Security professionals
how to deploy their bait strategically to capture and control hackers at the researcher’s
desired skill level.