Using routers and honeypots in combination for collecting Internet worm attacks
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...
Main Authors: | , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
CRC Press, Taylor & Francis Group, USA
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf |
id |
iium-34065 |
---|---|
recordtype |
eprints |
spelling |
iium-340652015-08-19T08:32:24Z http://irep.iium.edu.my/34065/ Using routers and honeypots in combination for collecting Internet worm attacks Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value. CRC Press, Taylor & Francis Group, USA 2014 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) Using routers and honeypots in combination for collecting Internet worm attacks. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 47-84. ISBN 9781482203516 http://www.crcnetbase.com/doi/book/10.1201/b16390 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan Using routers and honeypots in combination for collecting Internet worm attacks |
description |
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value. |
format |
Book Chapter |
author |
Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan |
author_facet |
Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan |
author_sort |
Mohammed, Mohssen M. Z. E. |
title |
Using routers and honeypots in combination for collecting Internet worm attacks |
title_short |
Using routers and honeypots in combination for collecting Internet worm attacks |
title_full |
Using routers and honeypots in combination for collecting Internet worm attacks |
title_fullStr |
Using routers and honeypots in combination for collecting Internet worm attacks |
title_full_unstemmed |
Using routers and honeypots in combination for collecting Internet worm attacks |
title_sort |
using routers and honeypots in combination for collecting internet worm attacks |
publisher |
CRC Press, Taylor & Francis Group, USA |
publishDate |
2014 |
url |
http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf |
first_indexed |
2023-09-18T20:49:10Z |
last_indexed |
2023-09-18T20:49:10Z |
_version_ |
1777409877875884032 |