One trick favored by hunters since prehistoric times still proves useful in the world of digital networks: bait. Security specialists often construct systems that appear vulnerable to attack, but actually offer no access to valuable data, administrative controls, or other computers. . . .
One trick favored by hunters since prehistoric times still proves useful in the world of digital networks: bait. Security specialists often construct systems that appear vulnerable to attack, but actually offer no access to valuable data, administrative controls, or other computers. These machines, known as "honeypots," are intended to be attacked, and have no legitimate users or traffic, leaving a foiled intruder exposed and relatively easy to monitor. Placed strategically within a LAN or alone on a dedicated Internet connection, honeypots can lure attackers away from valuable network hosts, collect data for research or legal action, and alert administrators of attacks in progress.

Several commercial vendors offer high-powered honeypot packages which can simulate entire network segments on a single machine. Applications, such as PGP Security's CyberCop Sting and Recourse Technologies Manhunt, typically require a dedicated host with substantial processing power and available memory. They can provide an elaborate environment to keep intruders very busy.

The link for this article located at ZDNet is no longer available.