2018
DOI: 10.1007/978-981-10-7739-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Other Honeypot Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…A honeypot may be a software, hardware unit, or a combination of both, which attracts the attacker and intentionally lures the attacker to launch an attack against the system. Types of honeypots include pure honeypots, high interaction honeypots, low interaction honeypots [19] [20] [21], Honeywall [22], Honeytokens [23], Honeynets [24], and Honeyfarms [25].…”
Section: A Conventional Solutionsmentioning
confidence: 99%
“…A honeypot may be a software, hardware unit, or a combination of both, which attracts the attacker and intentionally lures the attacker to launch an attack against the system. Types of honeypots include pure honeypots, high interaction honeypots, low interaction honeypots [19] [20] [21], Honeywall [22], Honeytokens [23], Honeynets [24], and Honeyfarms [25].…”
Section: A Conventional Solutionsmentioning
confidence: 99%
“…However, these purposes can be achieved only if it can operate without being identified as a trap by adversaries; otherwise, its values are significantly reduced or completely diminished. Honeypots can be classified by their degree of interaction that they provide to the attackers: low, medium and high-interaction honeypots [3][4][5].…”
Section: Introductionmentioning
confidence: 99%