Heat-seeking honeypots: design and experience

@inproceedings{John2011HeatseekingHD,
  title={Heat-seeking honeypots: design and experience},
  author={John P. John and Fang Yu and Yinglian Xie and Arvind Krishnamurthy and Mart{\'i}n Abadi},
  booktitle={WWW},
  year={2011}
}
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore constantly searching for vulnerable servers. In this work, we aim to understand how attackers find, compromise, and misuse vulnerable servers. Specifically, we present heat-seeking honeypots that actively attract attackers, dynamically generate and deploy honeypot pages, then analyze logs to identify attack patterns… CONTINUE READING
Highly Cited
This paper has 29 citations. REVIEW CITATIONS
19 Citations
0 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 19 extracted citations

Similar Papers

Loading similar papers…