Design of Network Security Projects Using Honeypots

@inproceedings{Sadasivam2004DesignON,
  title={Design of Network Security Projects Using Honeypots},
  author={Karthik Sadasivam and Banuprasad Samudrala and T. Andrew Yang},
  year={2004}
}
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS
17 Citations
8 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Simulating Network with Honeyd

  • R. Chandran, S. Pakala
  • Technical paper, Paladiaon Networks,
  • 2003
1 Excerpt

Simulating Network with Honeyd , Technical paper

  • R. Chandran, S. Pakala
  • 2003

Honeyd - A Low Involvement Honeypot in Action , originally published as part of the GCIA practical

  • R. Baumann
  • Developments of the Honeyd Virtual Honeypot

Similar Papers

Loading similar papers…