Research on network security of defense based on Honeypot

  title={Research on network security of defense based on Honeypot},
  author={Jian Bao and Chang-Peng Ji and Mo Gao},
  journal={2010 International Conference on Computer Application and System Modeling (ICCASM 2010)},
With the development of the network attack technique, the increase of the security risk on the internet, each host in the network may be the target of the attack. Honeypot technology can proactively detect and respond to the intrusion and the attack of the network. Compared with other security mechanisms, it has the feature of using simply, configurations flexibly, occupying less resource, and working effectively in a complex environment, furthermore, all the collected data and information has… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 10 extracted citations


Publications referenced by this paper.
Showing 1-5 of 5 references

Open Source Honeypots [EB/OL] .Http: // wobcasts/Show.php?webcastid=90525

L. Spitzner

Know your Enemy: Tracking Botnets

The Honeynet Project, The Honeynet Research Alliace
Using honeynets to learn more about Bots, The Honeynet Project Whitepaper, Ipapers/bots/, March • 2005

Honeypot - Definitions and Value of Honeypots" 2003/05/29. Available from Ipapers/honeypots.htm

L. Spitzner

Similar Papers

Loading similar papers…