Skip to search formSkip to main contentSkip to account menu

Honeypot (computing)

Known as: Military intrusion detection honeypots, Victim host, Honey pot (computing) 
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data… 
Highly Cited
2012
Highly Cited
2012
With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as… 
2010
2010
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest… 
Highly Cited
2010
Highly Cited
2010
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser… 
2009
2009
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the… 
Review
2009
Review
2009
In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the… 
2006
2006
System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught… 
Highly Cited
2005
Highly Cited
2005
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of… 
2005
2005
The use of honeynets as a means to detect and observe attacks originating from the Internet as well as to allow forensic analysis… 
2004
2004
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…