Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting targeted attacks using shadow honeypots
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Proceedings of the 2009 International Conference on Hybrid Information Technology
The DecoyPort: redirecting hackers to honeypots
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Robust reactions to potential day-zero worms through cooperation and validation
ISC'06 Proceedings of the 9th international conference on Information Security
A security framework for blocking new types of internet worms in ubiquitous computing environments
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
Installing a honeynet within large enterprise networks provides an additional security tool. Honeynets complement the use of firewalls and IDSs and help overcome some of the shortcomings inherent in those systems. In addition, honeynets can also serve as platforms for conducting computer security research and education.