2015
DOI: 10.1007/978-3-319-19419-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 7 publications
0
3
0
1
Order By: Relevance
“…But then, the thorough interpretation of lessons learned from using the honeypots was outlined. Principal results are shown in [13], in addition they underline the fact that the differentiation between honeypots according to their IP address is quite rough (e.g. differentiation for academic and commercial network).…”
Section: Related Workmentioning
confidence: 87%
See 1 more Smart Citation
“…But then, the thorough interpretation of lessons learned from using the honeypots was outlined. Principal results are shown in [13], in addition they underline the fact that the differentiation between honeypots according to their IP address is quite rough (e.g. differentiation for academic and commercial network).…”
Section: Related Workmentioning
confidence: 87%
“…But then, low-interaction honeypots are discussed in Sochor and Zuzcak in papers [12,13]. In [12] data show currently spreading threats caught by honeypots.…”
Section: Related Workmentioning
confidence: 99%
“…Method is able to detect bots, that use such evasion techniques as cycling of IP mapping, "domain flax", "fast flux" and DNStunneling. In [23] a system of baits for malware provoking, which is located in a distributed system, is developed. To identify new botnets, the system requires a permanent addition of malware's behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Одним із способів вивчення поведінки ботмереж є використання мереж-приманок. Наприклад, підходи [3,4] представляють детальний аналіз різних атак проти мереж-приманок на базі Linux. Підходи показують, як аналізувати атаки залежно від їх типів, таких як тривалість сесії, країни та регіональний Інтернет-реєстру (RIR) походження атаки.…”
Section: вступunclassified