Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
In this project, we analyze the usefulness of a Distributed Honeypot System (DHS) as a large-scale intelligence-gathering tool. Specifically, we will deploy and operate a DHS involving multiple types of honeypots at multiple types of organizations, collect attack data from these deployed honeypots, and systematically analyze that data to determine the breadth and depth of attack activity directed against the DHS. This analysis will include a consideration of the type of attack activity and apparent skill and purpose of the attackers, for the overall DHS and as a function of honeypot and organization type.