Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) Using routers and honeypots in combination for collecting Internet worm attacks. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 47-84. ISBN 9781482203516
PDF ( Using routers and honeypots in combination for collecting Internet worm attacks)
- Published Version
Restricted to Repository staff only Download (1MB) | Request a copy |
Abstract
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value.
Item Type: | Book Chapter |
---|---|
Additional Information: | 6481/34065 |
Uncontrolled Keywords: | routers, honeypots |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Dr. Al-Sakib Khan Pathan |
Date Deposited: | 17 Feb 2014 16:14 |
Last Modified: | 19 Aug 2015 16:32 |
URI: | http://irep.iium.edu.my/id/eprint/34065 |
Actions (login required)
View Item |