Skip to search formSkip to main contentSkip to account menu

Honeypot (computing)

Known as: Military intrusion detection honeypots, Victim host, Honey pot (computing) 
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data… 
Highly Cited
2012
Highly Cited
2012
With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as… 
2010
2010
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest… 
Highly Cited
2010
Highly Cited
2010
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser… 
2009
2009
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the… 
2006
2006
System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught… 
Highly Cited
2005
Highly Cited
2005
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of… 
2005
2005
The use of honeynets as a means to detect and observe attacks originating from the Internet as well as to allow forensic analysis… 
Highly Cited
2004
Highly Cited
2004
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though… 
2004
2004
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…