Honeypot

Known as: Honey pot, Military intrusion detection honeypots, Victim host 
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2018
05010020022018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The number of client-side attacks has grown significantly in the past few years, shifting focus away from defendable positions to… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2004
2004
Spammers continually scan the Internet for open proxy relays: by using these open relays, they can obscure their originating IP… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Some attacks on honeypots are very frequent and repetitive. In addition, such repetitive attacks generate a very large amount of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?