Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,951,058 papers from all fields of science
Search
Sign In
Create Free Account
Honeypot (computing)
Known as:
Military intrusion detection honeypots
, Victim host
, Honey pot (computing)
Expand
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
AppleLink
Bastion host
Black hat
Black hole (networking)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Identification Method of Attack Path Based on Immune Intrusion Detection
Wenhua Huang
,
Y. Geng
J. Networks
2014
Corpus ID: 14883885
This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data…
Expand
2010
2010
Client honeypots: Approaches and challenges
Mahmoud T. Qassrawi
,
Hongli Zhang
International Conference on New Trends in…
2010
Corpus ID: 17696051
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest…
Expand
Highly Cited
2010
Highly Cited
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki Akiyama
,
Makoto Iwamura
,
Yuhei Kawakoya
,
Kazufumi Aoki
,
M. Itoh
IEICE transactions on communications
2010
Corpus ID: 25230455
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser…
Expand
2009
2009
Amun : a python honeypot
Jan Göbel
2009
Corpus ID: 17400600
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the…
Expand
Highly Cited
2008
Highly Cited
2008
Protecting Financial Institutions from Brute-Force Attacks
Cormac Herley
,
D. Florêncio
IFIP International Information Security…
2008
Corpus ID: 17921535
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large…
Expand
2006
2006
Dynamic Honeypot Construction
Amanjot Kaur
2006
Corpus ID: 13980774
System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught…
Expand
Highly Cited
2005
Highly Cited
2005
A Pointillist Approach for Comparing Honeypots
F. Pouget
,
Thorsten Holz
International Conference on Detection of…
2005
Corpus ID: 2841937
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of…
Expand
Highly Cited
2004
Highly Cited
2004
Collapsar: A VM-Based Architecture for Network Attack Detention Center
Xuxian Jiang
,
Dongyan Xu
USENIX Security Symposium
2004
Corpus ID: 5883342
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though…
Expand
2004
2004
Using Honeynets to Protect Large Enterprise Networks
J. Levine
,
J. Grizzard
,
H. Owen
IEEE Security and Privacy
2004
Corpus ID: 43827283
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…
Expand
Highly Cited
2004
Highly Cited
2004
Secure "selecticast" for collaborative intrusion detection systems
Philip Gross
International Conference on Software Engineering
2004
Corpus ID: 16803148
The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE