Research on network security of defense based on Honeypot

@article{Bao2010ResearchON,
  title={Research on network security of defense based on Honeypot},
  author={Jian Bao and Chang-Peng Ji and Mo Gao},
  journal={2010 International Conference on Computer Application and System Modeling (ICCASM 2010)},
  year={2010},
  volume={10},
  pages={V10-299-V10-302}
}
With the development of the network attack technique, the increase of the security risk on the internet, each host in the network may be the target of the attack. Honeypot technology can proactively detect and respond to the intrusion and the attack of the network. Compared with other security mechanisms, it has the feature of using simply, configurations flexibly, occupying less resource, and working effectively in a complex environment, furthermore, all the collected data and information has… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Open Source Honeypots [EB/OL] .Http: //www.sans.org/ wobcasts/Show.php?webcastid=90525

L. Spitzner
2006

Know your Enemy: Tracking Botnets

The Honeynet Project, The Honeynet Research Alliace
Using honeynets to learn more about Bots, The Honeynet Project Whitepaper, http://www.honeynet.org Ipapers/bots/, March • 2005

Honeypot - Definitions and Value of Honeypots" 2003/05/29. Available from http://www.tracking-hackers.com Ipapers/honeypots.htm

L. Spitzner
2003

Similar Papers

Loading similar papers…