Data Capture added

pull/79/head
Michael Hamm 2018-01-03 10:40:19 +01:00
parent 4a36d1b78f
commit 1c15c48c3c
1 changed files with 28 additions and 3 deletions

View File

@ -9,9 +9,9 @@
"description": "Describes whether the exposed functionality of a honeypot is limited in some way, which is usually the case for honeypots that simulate services." "description": "Describes whether the exposed functionality of a honeypot is limited in some way, which is usually the case for honeypots that simulate services."
}, },
{ {
"value": "interaction-level", "value": "data-capture",
"expanded": "Interaction Level", "expanded": "Data Capture",
"description": "Describes whether the exposed functionality of a honeypot is limited in some way, which is usually the case for honeypots that simulate services." "description": "Describes the type of data a honeypot is able to capture"
}, },
{ {
"value": "interaction-level", "value": "interaction-level",
@ -49,6 +49,31 @@
"description": "Exposed functionality being limited. For example, a simulated SSH server of a honeypot is not able to authenticate against a valid login/password combination" "description": "Exposed functionality being limited. For example, a simulated SSH server of a honeypot is not able to authenticate against a valid login/password combination"
} }
] ]
},
{
"predicate": "data-capture",
"entry": [
{
"value": "events",
"expanded": "Events",
"description": "The honeypot collects data about something that has happened or took place, a change in state."
},
{
"value": "attacks",
"expanded": "Attacks",
"description": "The honeypot collects malicious activity."
},
{
"value": "intrusions",
"expanded": "Intrusions",
"description": "The honeypot collects malicious activity that leads to a security failure."
},
{
"value": "none",
"expanded": "None",
"description": "The honeypot does not collect events, attacks, or intrusions."
}
]
} }
] ]
} }