2012
DOI: 10.5120/8815-2499
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Distributed Honeypot System

Abstract: Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in the centralised control system to improve network security and presents the experimental results which successfully im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…For the former, the highly interactive honeypots are proposed to give attackers the adequate feedbacks of information [29,30]. For the latter, the distributed honey-net system is set up to provide more accurate attacking report under circumstance of highly cooperating between virtual honeypots [31,32]. 3) Out-of-VM Monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…For the former, the highly interactive honeypots are proposed to give attackers the adequate feedbacks of information [29,30]. For the latter, the distributed honey-net system is set up to provide more accurate attacking report under circumstance of highly cooperating between virtual honeypots [31,32]. 3) Out-of-VM Monitoring.…”
Section: Related Workmentioning
confidence: 99%