Client honeypot

Known as: Client honeypot / honeyclient, Honeyclient 
Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2016
0246820062016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In today’s world where internet is hosting major resources of this world, the malware programs embedded into web pages have… (More)
  • figure 1
  • figure 3
  • figure 3
Is this relevant?
2012
2012
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table II
Is this relevant?
2012
2012
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be… (More)
  • table 1-1
  • figure 1-1
  • figure 2-1
  • figure 2-2
  • figure 2-3
Is this relevant?
2012
2012
Computers security has become a major issue in many organization. There are different solutions to response to this needs but… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2011
2011
In recent years, attackers have started to use web pages to deliver their malicious code to users. Web-based malware overcomes… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 3
Is this relevant?
2010
2010
Modern attacks are being made against client side applications, such as web browsers, which most users use to surf and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2010
2010
Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2010
2010
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The number of client-side attacks has grown significantly in the past few years, shifting focus away from defendable positions to… (More)
  • figure 1
  • table 1
Is this relevant?
2006
2006
A honeypot is a security device that is designed to lure malicious activity to itself. Capturing such malicious activity allows… (More)
  • figure 2
  • figure 3
  • figure 8
Is this relevant?