2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS) 2012
DOI: 10.1109/iciinfs.2012.6304786
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid honeypot framework for malware collection and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Honeypot Framework is a deceptive defense method designed to serves two purposes: early warnings and forensic analysis. These systems are placed to mislead cyber attackers, and then to detect and study the attempts to gain unauthorized access to information systems [10], [11]. Honeypot frameworks are relatively new technology and being adopted by large cloud service providers.…”
Section: B Deceptive Defense Mechanismsmentioning
confidence: 99%
“…Honeypot Framework is a deceptive defense method designed to serves two purposes: early warnings and forensic analysis. These systems are placed to mislead cyber attackers, and then to detect and study the attempts to gain unauthorized access to information systems [10], [11]. Honeypot frameworks are relatively new technology and being adopted by large cloud service providers.…”
Section: B Deceptive Defense Mechanismsmentioning
confidence: 99%
“…Kumar et al [6] proposed an integrated system that includes client and server honeypots. The server and the client honeypots are controlled by an active controller, which is a single centralized server.…”
Section: Related Literaturementioning
confidence: 99%