Skip to search formSkip to main contentSkip to account menu

Honeypot (computing)

Known as: Military intrusion detection honeypots, Victim host, Honey pot (computing) 
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data… 
2010
2010
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest… 
Highly Cited
2010
Highly Cited
2010
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser… 
2009
2009
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the… 
Highly Cited
2008
Highly Cited
2008
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large… 
2006
2006
System security personnel fight a seemingly unending battle to secure their digital assets against an ever-increasing onslaught… 
Highly Cited
2005
Highly Cited
2005
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of… 
Highly Cited
2004
Highly Cited
2004
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though… 
2004
2004
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks… 
Highly Cited
2004
Highly Cited
2004
The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we…