2015 International Conference on Advances in Computer Engineering and Applications 2015
DOI: 10.1109/icacea.2015.7164809
|View full text |Cite
|
Sign up to set email alerts
|

CATCH: Comparison and analysis of tools covering honeypots

Abstract: Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…Proactive cloud nodes can implement basic through the most sophisticated detective control methods using artificial intelligence, honeypotting, intrusion detection systems, etc. [66], [67].…”
Section: Proactive and Passive Cloud Nodesmentioning
confidence: 99%
“…Proactive cloud nodes can implement basic through the most sophisticated detective control methods using artificial intelligence, honeypotting, intrusion detection systems, etc. [66], [67].…”
Section: Proactive and Passive Cloud Nodesmentioning
confidence: 99%
“…Specter can emulate some network services, as well as some systems of the most common operations. It is classified between as a medium-interaction honeypot and emulates various services such as FTP, POP3, and HTTP [30]. Specter is usable on operating systems based on Windows NT, 2000 or XP [28].…”
Section: 4mentioning
confidence: 99%
“…Honeypot Framework is a deceptive defense method designed to serves two purposes: early warnings and forensic analysis. These systems are placed to mislead cyber attackers, and then to detect and study the attempts to gain unauthorized access to information systems [10], [11]. Honeypot frameworks are relatively new technology and being adopted by large cloud service providers.…”
Section: B Deceptive Defense Mechanismsmentioning
confidence: 99%