Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,623 papers from all fields of science
Search
Sign In
Create Free Account
Honeypot (computing)
Known as:
Military intrusion detection honeypots
, Victim host
, Honey pot (computing)
Expand
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
AppleLink
Bastion host
Black hat
Black hole (networking)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid
Kun Wang
,
Miao Du
,
Sabita Maharjan
,
Yanfei Sun
IEEE Transactions on Smart Grid
2017
Corpus ID: 27021293
Advanced metering infrastructure (AMI) is an important component for a smart grid system to measure, collect, store, analyze, and…
Expand
Highly Cited
2016
Highly Cited
2016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
Yin Minn Pa Pa
,
Shogo Suzuki
,
K. Yoshioka
,
Tsutomu Matsumoto
,
Takahiro Kasama
,
C. Rossow
Journal of Information Processing
2016
Corpus ID: 3658077
: We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed…
Expand
Highly Cited
2015
Highly Cited
2015
IoTPOT: Analysing the Rise of IoT Compromises
Yin Minn Pa Pa
,
Shogo Suzuki
,
K. Yoshioka
,
Tsutomu Matsumoto
,
Takahiro Kasama
,
C. Rossow
Workshop on Offensive Technologies
2015
Corpus ID: 14053553
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed…
Expand
Highly Cited
2010
Highly Cited
2010
Honeypot detection in advanced botnet attacks
Ping Wang
,
Lei Wu
,
Ryan Cunningham
,
C. Zou
International Journal of Information and Computer…
2010
Corpus ID: 7211046
Botnets have become one of the major attacks in the internet today due to their illicit profitable financial gain. Meanwhile…
Expand
Highly Cited
2007
Highly Cited
2007
Accurate Real-time Identification of IP Prefix Hijacking
Xin Hu
,
Z. Morley Mao
IEEE Symposium on Security and Privacy
2007
Corpus ID: 11084003
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in real time to facilitate mitigation…
Expand
Highly Cited
2005
Highly Cited
2005
Mapping Internet Sensors with Probe Response Attacks
J. Bethencourt
,
Jason Franklin
,
M. Vernon
USENIX Security Symposium
2005
Corpus ID: 7800826
Internet sensor networks, including honeypots and log analysis centers such as the SANS Internet Storm Center, are used as a tool…
Expand
Highly Cited
2004
Highly Cited
2004
Testing network-based intrusion detection signatures using mutant exploits
Giovanni Vigna
,
William K. Robertson
,
D. Balzarotti
Conference on Computer and Communications…
2004
Corpus ID: 988405
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore…
Expand
Highly Cited
2004
Highly Cited
2004
NoSEBrEaK - attacking honeynets
M. Dornseif
,
Thorsten Holz
,
C. Klein
Proceedings from the Fifth Annual IEEE SMC…
2004
Corpus ID: 6641963
It is usually assumed that honeynets are hard to detect and that attempts to detect or disable them can be unconditionally…
Expand
Highly Cited
2003
Highly Cited
2003
The use of Honeynets to detect exploited systems across large enterprise networks
J. Levine
,
Richard LaBella
,
H. Owen
,
Didier Contis
,
Brian Culver
IEEE Systems, Man and Cybernetics…
2003
Corpus ID: 5229675
Computer networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact…
Expand
Highly Cited
1993
Highly Cited
1993
Opinions and perceptions of England and Wales heritage coast beach users: some management implications from the Glamorgan Heritage Coast, Wales
R. Morgan
,
T. C. Jones
,
A. Williams
1993
Corpus ID: 54223531
Beach users at four intensively zoned "honeypot" areas at the Glamorgan Heritage Coast (GHC), Wales, were questioned with regard…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE