"description":"Updated (CIRCL and Seamus Dowling) from Christian Seifert, Ian Welch, Peter Komisarczuk, ‘Taxonomy of Honeypots’, Technical Report CS-TR-06/12, VICTORIA UNIVERSITY OF WELLINGTON, School of Mathematical and Computing Sciences, June 2006, http://www.mcs.vuw.ac.nz/comp/Publications/archive/CS-TR-06/CS-TR-06-12.pdf",
"version":3,
"description":"Updated (CIRCL, Seamus Dowling and EURECOM) from Christian Seifert, Ian Welch, Peter Komisarczuk, ‘Taxonomy of Honeypots’, Technical Report CS-TR-06/12, VICTORIA UNIVERSITY OF WELLINGTON, School of Mathematical and Computing Sciences, June 2006, http://www.mcs.vuw.ac.nz/comp/Publications/archive/CS-TR-06/CS-TR-06-12.pdf",
"version":4,
"predicates":[
{
"value":"interaction-level",
@ -43,10 +43,15 @@
"expanded":"High Interaction Level",
"description":"Exposed functionality of the honeypot is not limited."
},
{
"value":"medium",
"expanded":"Medium Interaction Level",
"description":"Exposed functionality of the honeypot is limited to the service without exposing the full operating system."
},
{
"value":"low",
"expanded":"low Interaction Level",
"description":"Exposed functionality being limited. For example, a simulated SSH server of a honeypot is not able to authenticate against a valid login/password combination"
"description":"Exposed functionality being limited. For example, a simulated SSH server of a honeypot is not able to authenticate against a valid login/password combination."