Enabling an Anatomic View to Investigate Honeypot Systems: A Survey

@article{Fan2018EnablingAA,
  title={Enabling an Anatomic View to Investigate Honeypot Systems: A Survey},
  author={Wenjun Fan and Zhihui Du and David Fern{\'a}ndez and Víctor Villagrá},
  journal={IEEE Systems Journal},
  year={2018},
  volume={12},
  pages={3906-3919}
}
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for protecting production systems by detecting and deflecting unauthorized accesses. It is also useful for investigating the behavior of attackers, and in particular, unknown attacks. For the past 17 years plenty of effort has been invested in the research and development of honeypot techniques, and they have evolved to be an increasingly powerful means of defending against… CONTINUE READING
Tweets
This paper has been referenced on Twitter 4 times. VIEW TWEETS

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 86 REFERENCES

Cowrie - active kippo fork

  • M. Oosterhof
  • July . [Online]. Available: http://www…
  • 2015
Highly Influential
4 Excerpts

Specter: A commercial honeypot solution for windows

  • L. Spitzner
  • . [Online]. Available: http://www.symantec.com…
  • 2003
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…