<s>
Cowrie	B-Application
is	O
a	O
medium	O
interaction	O
SSH	B-Protocol
and	O
Telnet	B-Protocol
honeypot	O
designed	O
to	O
log	O
brute	O
force	O
attacks	O
and	O
shell	B-Operating_System
interaction	I-Operating_System
performed	O
by	O
an	O
attacker	O
.	O
</s>
<s>
Cowrie	B-Application
also	O
functions	O
as	O
an	O
SSH	B-Protocol
and	O
telnet	B-Protocol
proxy	B-Application
to	O
observe	O
attacker	O
behavior	O
to	O
another	O
system	O
.	O
</s>
<s>
Cowrie	B-Application
was	O
developed	O
from	O
Kippo	B-Language
.	O
</s>
<s>
Cowrie	B-Application
has	O
been	O
referenced	O
in	O
published	O
papers	O
.	O
</s>
<s>
The	O
Book	O
"	O
Hands-On	O
Ethical	O
Hacking	O
and	O
Network	O
Defense	O
"	O
includes	O
Cowrie	B-Application
in	O
a	O
list	O
of	O
5	O
commercial	O
honeypots	O
.	O
</s>
<s>
Discussing	O
a	O
honeypot	O
effort	O
called	O
the	O
Project	O
Heisenberg	O
Cloud	O
by	O
Rapid7	O
,	O
Bob	O
Rudis	O
,	O
the	O
company	O
's	O
chief	O
data	O
scientist	O
,	O
told	O
eWEEK	O
,	O
"	O
There	O
are	O
custom	O
Rapid7-developed	O
low	O
-	O
and	O
medium-interaction	O
honeypots	O
used	O
within	O
the	O
framework	O
,	O
along	O
with	O
open-source	O
ones	O
,	O
such	O
as	O
Cowrie.	O
"	O
</s>
<s>
Doug	O
Rickert	O
has	O
experimented	O
with	O
the	O
open-source	O
Cowrie	B-Application
SSH	B-Protocol
honeypot	O
and	O
wrote	O
about	O
it	O
on	O
Medium	O
.	O
</s>
<s>
Putting	O
up	O
a	O
simple	O
honeypot	O
is	O
n't	O
difficult	O
,	O
and	O
there	O
are	O
many	O
open-source	O
products	O
besides	O
Cowrie	B-Application
,	O
including	O
the	O
original	O
Honeyd	O
to	O
MongoDB	O
and	O
NoSQL	O
honeypots	O
,	O
to	O
ones	O
that	O
emulate	O
web	O
servers	O
.	O
</s>
<s>
Researchers	O
at	O
the	O
SysAdmin	O
,	O
Audit	O
,	O
Network	O
and	O
Security	O
(	O
SANS	O
)	O
institute	O
urged	O
administrators	O
and	O
security	O
researchers	O
to	O
run	O
the	O
latest	O
version	O
of	O
Cowrie	B-Application
on	O
a	O
honeypot	O
to	O
monitor	O
shifts	O
in	O
the	O
type	O
of	O
passwords	O
being	O
scanned	O
for	O
and	O
pattern	O
of	O
attacks	O
on	O
IoT	O
devices	O
.	O
</s>
<s>
Attack	O
Detection	O
and	O
Forensics	O
Using	O
Honeypot	O
in	O
an	O
IoT	O
Environment	O
calls	O
Cowrie	B-Application
a	O
"	O
medium	O
interaction	O
honeypot	O
"	O
and	O
describes	O
results	O
from	O
using	O
it	O
for	O
40	O
days	O
to	O
capture	O
"	O
all	O
communicated	O
sessions	O
in	O
log	O
files.	O
"	O
</s>
<s>
The	O
book	O
Advances	O
on	O
Data	O
Science	O
also	O
devotes	O
chapter	O
two	O
to	O
"	O
Cowrie	B-Application
Honeypot	O
Dataset	O
and	O
Logging.	O
"	O
</s>
<s>
ICCWS	O
2018	O
13th	O
International	O
Conference	O
on	O
Cyber	O
Warfare	O
and	O
Security	O
describes	O
using	O
Cowrie	B-Application
.	O
</s>
<s>
On	O
the	O
Move	O
to	O
Meaningful	O
Internet	O
Systems	O
:	O
OTM	O
2019	O
Conferences	O
includes	O
details	O
of	O
using	O
Cowrie	B-Application
.	O
</s>
<s>
Splunk	O
,	O
a	O
security	O
tool	O
that	O
can	O
receive	O
information	O
from	O
honeypots	O
,	O
outlines	O
how	O
to	O
set	O
up	O
a	O
honeypot	O
using	O
the	O
open-source	O
Cowrie	B-Application
package	O
.	O
</s>
