Specification of a Model of Honeypot Attack based on Raised Data

  title={Specification of a Model of Honeypot Attack based on Raised Data},
  author={Souleymane Oumtanaga and Prosper Kimou and Kouadio Gaza Kevin},
The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.


Publications referenced by this paper.
Showing 1-2 of 2 references

Honeypots: Tracking Hackers, Add.-Wesley

L. Spitzner
ISBN from-321-10895-7, • 2002
View 1 Excerpt

Similar Papers

Loading similar papers…