Honeypots: Tracking Hackers
The Honeynet Project: Trapping the Hackers
IEEE Security and Privacy
Honeynets: an educational resource for IT security
CITC5 '04 Proceedings of the 5th conference on Information technology education
Design of network security projects using honeypots
Journal of Computing Sciences in Colleges
Implementing PII honeytokens to mitigate against thethreat of Malicous insiders
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Gray networking: a step towards next generation computer networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Honeypot in network security: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
Limitation of honeypot/honeynet databases to enhance alert correlation
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.00 |
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A honeypot is a security resource whose value lies in being probed, attacked or compromised. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology. We examine different kinds of honeypots, honeypot concepts, and approaches to their implementation.