Other Sellers on Amazon
+ $3.99 shipping
96% positive over last 12 months
& FREE Shipping
87% positive over last 12 months
You’ve got a Kindle.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.
Enter your mobile phone or email address
By pressing "Send link," you agree to Amazon's Conditions of Use.
You consent to receive an automated text message from or on behalf of Amazon about the Kindle App at your mobile number above. Consent is not a condition of any purchase. Message & data rates may apply.
Follow the Author
OK
Intrusion Detection Honeypots: Detection through Deception Paperback – August 30, 2020
|
Chris Sanders
(Author)
Find all the books, read about the author, and more.
See search results for this author
|
|
Price
|
New from | Used from |
Enhance your purchase
When an attacker breaks into your network, you have a home-field advantage. But how do you use it?
Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring honeypots -- security resources whose value lies in being probed and attacked. These fake systems, services, and tokens lure attackers in, enticing them to interact. Unbeknownst to the attacker, those interactions generate logs that alert you to their presence and educate you about their tradecraft. Intrusion Detection Honeypots teaches you how to: - Use the See-Think-Do framework to integrate honeypots into your network and lure attackers into your traps.
- Leverage honey services that mimic HTTP, SSH, and RDP.
- Hide honey tokens amongst legitimate documents, files, and folders.
- Entice attackers to use fake credentials that give them away.
- Create honey commands, honey tables, honey broadcasts, and other unique detection tools that leverage deception.
- Monitor honeypots for interaction and investigate the logs they generate.
With the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals.
-
Print length238 pages
-
LanguageEnglish
-
Publication dateAugust 30, 2020
-
Dimensions7.5 x 0.54 x 9.25 inches
-
ISBN-101735188301
-
ISBN-13978-1735188300
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now
Frequently bought together
Customers who viewed this item also viewed
Editorial Reviews
Review
Product details
- Publisher : Applied Network Defense (August 30, 2020)
- Language : English
- Paperback : 238 pages
- ISBN-10 : 1735188301
- ISBN-13 : 978-1735188300
- Item Weight : 14.7 ounces
- Dimensions : 7.5 x 0.54 x 9.25 inches
-
Best Sellers Rank:
#407,985 in Books (See Top 100 in Books)
- #142 in Computer Viruses
- #368 in Computer Network Security
- Customer Reviews:
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
About the author

Chris Sanders is an information security author, trainer, and researcher originally from Mayfield, KY now living in Gainesville, GA.
He is the founder of Applied Network Defense, a company focused on delivering high quality, accessible information security training. In previous roles, Chris worked with the US Department of Defense, InGuardians, and Mandiant to build security operation centers and train practitioners focused on defending defense, government, and Fortune 500 networks. Chris is also the founder and director of the Rural Technology Fund, a non-profit that donates scholarships and equipment to public schools to further technical education in rural and high poverty areas. To date, the RTF has put computer science education resources into the hands of over 100,000 students in all 50 states.
Chris has authored several books and articles, including the international bestseller “Practical Packet Analysis” from No Starch Press, currently in its third edition and in seven languages, and “Applied Network Security Monitoring” from Syngress. His current research focus is on the intersection of cybersecurity and cognitive psychology with the goal of enhancing the field of infosec investigative disciplines through a better understanding of the human thought and learning processes.
Chris blogs at http://www.chrissanders.org. You can learn more about Applied Network Defense at http://www.networkdefense.co and the RTF at http://www.ruraltechfund.org.
Customer reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- If you think honeypots are not for you, read this book
- If you think your company is not ready for honeypots, read this book
- If you want to effectively and simply detect if adversaries are dwelling in your network (and have fun with it), read this book.
The core of the book is to provide step-by-step tutorials to setup your own detection mechanisms, from start to finish. What I particularly appreciated is the highlight put in the monitoring aspects, which is often the forgotten part despite being essential. Here, you will get ready-to-use Sigma rules written by the author and that you can download from his website.
The book does a great job at covering the different uses of deception as a detection mechanism, from honey services to honey credentials, and gives you food for thought with anecdotes and real-life examples. Some clever ideas made me smile, such as how a standard DHCP server can be used as an unauthorized devices detection mechanism. After these you'll start getting your own ideas which will help raise the bar of cybersecurity.
About 230 pages written in a concise, easy to read and efficient way.
I do plan on purchasing the hard copy of this book and will update this review to include the content at a later time.
Top reviews from other countries
And I FLEW through the first ~25% of the book, until Chris started to introduce problems in the material. What were these problems you ask? Trigger my inner geek and making me want to try a different t project with every topic discussed.
This DEFINITELY got my creative juices flowing. Despite me thinking I knew deception tech, having run honeypots for over a decade, and been up on stage many times evangelising the benefits I learnt lots, from Chris’ writings, have a backlog of projects I want to sink my teeth into, and suspect I’ll be keeping this time near by as a handy reference for some time to come.
Highly recommend it for anyone trying this stuff out for the first time, or for people who have experience with deception based detection but want to level up and formalize it.
10/10 would buy again!
Reviewed in Germany on November 18, 2020
10/10 would buy again!
This book is full of nice suggestions on how you can Deploy honeypots to detect intrusion in an effective way.



















