Honeypot (computing)

Known as: Military intrusion detection honeypots, Victim host, Honey pot (computing) 
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
  • Chris Moore
  • Cybersecurity and Cyberforensics Conference (CCC)
  • 2016
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Social networking communities have become an important communications platform, but the popularity of these communities has also… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Client honeypots crawl the Internet to find and identify servers that exploit client-side vulnerabilities. Traditionally, these… (More)
  • figure 2
  • figure 3
  • figure 8
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2004
2004
Some attacks on honeypots are very frequent and repetitive. In addition, such repetitive attacks generate a very large amount of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information… (More)
Is this relevant?