2019
DOI: 10.12700/aph.16.10.2019.10.11
|View full text |Cite
|
Sign up to set email alerts
|

A Clustered Hybrid Honeypot Architecture

Abstract: Nowadays, when computers and computer systems are almost omnipresent and are part of most households and most people have access to them, they are more vulnerable than ever. Today, protection and security of computer networks and systems using passive protection does not suffice anymore. One has to anticipate attacks and be a step ahead of the attackers. To achieve this type of security, one has to employ active protection techniques, such as digital baitshoneypots. The primary goal of using honeypots is to di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Attacks carried out as continuous intervention, are often implemented to influence strongly safety critical systems by moving system state from safe and secured operational circumstances to a high risk operational domain [39]. These kind of incidents can be implemented for example by denial-of-service attacks in which the attacker aims to make a system resource ineffectual to the regular user for instance by flooding it from different sources [40].…”
Section: Figure 7 Conceptualization Framework Of Cybersecurity Relatementioning
confidence: 99%
“…Attacks carried out as continuous intervention, are often implemented to influence strongly safety critical systems by moving system state from safe and secured operational circumstances to a high risk operational domain [39]. These kind of incidents can be implemented for example by denial-of-service attacks in which the attacker aims to make a system resource ineffectual to the regular user for instance by flooding it from different sources [40].…”
Section: Figure 7 Conceptualization Framework Of Cybersecurity Relatementioning
confidence: 99%