{"id":13798,"date":"2014-08-02T11:53:06","date_gmt":"2014-08-02T16:53:06","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=13798"},"modified":"2014-08-02T12:42:42","modified_gmt":"2014-08-02T17:42:42","slug":"create-an-army-of-raspberry-pi-honeypots-on-a-budget","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=13798","title":{"rendered":"Create an Army of Raspberry Pi Honeypots on a Budget"},"content":{"rendered":"<blockquote><p>Organizations typically focus on monitoring inbound and outbound network traffic via firewalls, yet ignore internal network traffic due to the complexity involved. In the scenario above, a firewall will not protect or alert us.<\/p>\n<p>By running honeypots on our internal network, we are able to detect anomalous events. We gain awareness and insight into our network when network hosts interact with a Raspberry Pi honeypot sensor. Since there isn\u2019t a good reason to interact with it (since it doesn\u2019t do anything), activity on the Raspberry Pi is usually indicative of something roaming around our network and a possible security breach.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/threatstream.com\/blog\/create-an-army-of-raspberry-pi-honeypots-on-a-budget\">Create an Army of Raspberry Pi Honeypots on a Budget | ThreatStream<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations typically focus on monitoring inbound and outbound network traffic via firewalls, yet ignore internal network traffic due to the complexity involved. In the scenario above, a firewall will not protect or alert us. By running honeypots on our internal &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=13798\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[915,339,400,283],"class_list":["post-13798","post","type-post","status-publish","format-standard","hentry","category-networking","tag-honeypot","tag-network-intrusion","tag-raspberry-pi","tag-tech-blog"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13798"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13798\/revisions"}],"predecessor-version":[{"id":13799,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13798\/revisions\/13799"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13798"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}