DOI: 10.20868/upm.thesis.46846
|View full text |Cite
|
Sign up to set email alerts
|

Contribution to the Design of a Flexible and Adaptive Solution for the Management of Heterogeneous Honeypot Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…So, honeypot must have some security program to make it trusted. In [22], the author showed that the security level should be enhanced along with the interaction level in context of honeypot. The paper [23] separated the captor from the decoy, and the captor actually represents the security program in context of honeypot.…”
Section: Honeydoc Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…So, honeypot must have some security program to make it trusted. In [22], the author showed that the security level should be enhanced along with the interaction level in context of honeypot. The paper [23] separated the captor from the decoy, and the captor actually represents the security program in context of honeypot.…”
Section: Honeydoc Architecturementioning
confidence: 99%
“…Therefore, a type of efficient honeypot system, whereby the attack activities can be sensitively classified and processed in fine-grained ways, and then consumed by the unperceived honeypot resource with appropriate countermeasures is highly needed [22]. Nevertheless, the existing honeypot systems are not able to provide this kind of comprehensiveness, because there is a lack of architecture that can facilitate the all-round honeypot design.…”
mentioning
confidence: 99%