Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Honeypot (computing)
Known as:
Military intrusion detection honeypots
, Victim host
, Honey pot (computing)
Expand
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
AppleLink
Bastion host
Black hat
Black hole (networking)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Identification Method of Attack Path Based on Immune Intrusion Detection
Wenhua Huang
,
Y. Geng
J. Networks
2014
Corpus ID: 14883885
This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data…
Expand
Highly Cited
2012
Highly Cited
2012
Virtual Machine Introspection in a Hybrid Honeypot Architecture
Tamas K. Lengyel
,
Justin Neumann
,
S. Maresca
,
B. Payne
,
A. Kiayias
CSET
2012
Corpus ID: 9289990
With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as…
Expand
2010
2010
Client honeypots: Approaches and challenges
Mahmoud T. Qassrawi
,
Hongli Zhang
International Conference on New Trends in…
2010
Corpus ID: 17696051
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest…
Expand
Highly Cited
2010
Highly Cited
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki Akiyama
,
Makoto Iwamura
,
Yuhei Kawakoya
,
Kazufumi Aoki
,
M. Itoh
IEICE transactions on communications
2010
Corpus ID: 25230455
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser…
Expand
2009
2009
Amun : a python honeypot
Jan Göbel
2009
Corpus ID: 17400600
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the…
Expand
2006
2006
Dynamic Honeypot Construction
Amanjot Kaur
2006
Corpus ID: 13980774
System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught…
Expand
Highly Cited
2005
Highly Cited
2005
A Pointillist Approach for Comparing Honeypots
F. Pouget
,
Thorsten Holz
International Conference on Detection of…
2005
Corpus ID: 2841937
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of…
Expand
2005
2005
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet
Stephan Riebach
,
E. Rathgeb
,
Birger Tödtmann
NETWORKING
2005
Corpus ID: 1731361
The use of honeynets as a means to detect and observe attacks originating from the Internet as well as to allow forensic analysis…
Expand
Highly Cited
2004
Highly Cited
2004
Collapsar: A VM-Based Architecture for Network Attack Detention Center
Xuxian Jiang
,
Dongyan Xu
USENIX Security Symposium
2004
Corpus ID: 5883342
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though…
Expand
2004
2004
Using Honeynets to Protect Large Enterprise Networks
J. Levine
,
J. Grizzard
,
H. Owen
IEEE Security and Privacy
2004
Corpus ID: 43827283
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE