Главная
Study mode:
on
1
Introduction
2
Industrial Internet of Things
3
Digital Twin
4
Cyber Security
5
Dynamic Deception
6
Types of Deception
7
Signal Injection
8
What is a Honeypot
9
Goals of Honeypots
10
Insider Threat
11
Python Implementation
12
Output
13
Code Complexity
14
Twisted
15
Twisted Example
16
Lesson 19 Less Than 20 Lines of Code
17
Lesson 19 Dynamic Example
18
Modbus Example
19
Scaling
20
Conclusion
Description:
Explore the evolution of honeypots and dynamic deception techniques in enterprise network defense through this BSidesSF 2018 conference talk. Delve into the concept of "Honeypots 2.0" and learn how modern technologies like virtualization, cloud computing, containers, and DevOps tool chains enable scaling honeypots for greater impact in large-scale enterprise networks. Discover the potential of the Python-based Twisted networking framework for developing advanced honeypot technologies. Gain insights into honeypot essentials, scaling strategies, and the implementation of dynamic deception at scale. Examine practical examples, including Modbus and dynamic implementations, with less than 20 lines of code. Understand the relevance of these techniques in defending against insider threats and securing Industrial Internet of Things (IIoT) environments.

Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Security BSides San Francisco
Add to list