Honeypots: concepts, approaches, and challenges

@inproceedings{Mokube2007HoneypotsCA,
  title={Honeypots: concepts, approaches, and challenges},
  author={Iyatiti Mokube and M. Adams},
  booktitle={ACM-SE 45},
  year={2007}
}
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A honeypot is a security resource whose value lies in being probed, attacked or compromised. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology. We examine different kinds of… Expand
Honeypot: A Survey
Analysis of attack and attackers on VoIP Honeypot environment
Honeypots: Virtual Network Intrusion Monitoring System
Legal issues of honeynet's generations
  • P. Sokol
  • Computer Science
  • Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
  • 2014
Weems: An extensible HTTP honeypot
A survey of honeypot research: Trends and opportunities
...
1
2
3
4
5
...

References

SHOWING 1-3 OF 3 REFERENCES
White Paper : Honeypots
Honeytokens: The Other Honeypot
  • http://www.securityfocus.com/infocus/1713, Security Focus,
  • 2003
Open Source Honeypots: Learning with Honeyd
  • Security Focus,
  • 2003