2013
DOI: 10.12720/jcm.8.11.700-707
|View full text |Cite
|
Sign up to set email alerts
|

Honeypots Aiding Network Forensics: Challenges and Notions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…It is also probable that the honeypots are capturing the behaviors of script kiddies and not the type of hackers that are involved with more serious data breaches. More skilled hackers have become more adept at identifying honeypots and avoiding these systems (Hayatle, Youssef, and Otrok, ; Nasir and Al‐Mousa, ). It is not possible to know whether the system intruders ever knew they were in a honeypot (Maimon et al., ).…”
Section: Implications Of Honeypot Limitationsmentioning
confidence: 99%
“…It is also probable that the honeypots are capturing the behaviors of script kiddies and not the type of hackers that are involved with more serious data breaches. More skilled hackers have become more adept at identifying honeypots and avoiding these systems (Hayatle, Youssef, and Otrok, ; Nasir and Al‐Mousa, ). It is not possible to know whether the system intruders ever knew they were in a honeypot (Maimon et al., ).…”
Section: Implications Of Honeypot Limitationsmentioning
confidence: 99%
“…For instance honeypot could be helpful here, which is a trap method that is created and set up to be hacked with the intention of wasting the attacker's resources and time on honeypots rather than attacking real existing systems. [3]. This paper bene ts from this concept and uses a development hybrid honeypot to improve network security monitoring, identi cation, and strengthening system security commonly.…”
Section: Introductionmentioning
confidence: 99%