Using routers and honeypots in combination for collecting Internet worm attacks

The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...

Full description

Bibliographic Details
Main Authors: Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan
Format: Book Chapter
Language:English
Published: CRC Press, Taylor & Francis Group, USA 2014
Subjects:
Online Access:http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf
id iium-34065
recordtype eprints
spelling iium-340652015-08-19T08:32:24Z http://irep.iium.edu.my/34065/ Using routers and honeypots in combination for collecting Internet worm attacks Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value. CRC Press, Taylor & Francis Group, USA 2014 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) Using routers and honeypots in combination for collecting Internet worm attacks. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 47-84. ISBN 9781482203516 http://www.crcnetbase.com/doi/book/10.1201/b16390
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
Using routers and honeypots in combination for collecting Internet worm attacks
description The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value.
format Book Chapter
author Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
author_facet Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
author_sort Mohammed, Mohssen M. Z. E.
title Using routers and honeypots in combination for collecting Internet worm attacks
title_short Using routers and honeypots in combination for collecting Internet worm attacks
title_full Using routers and honeypots in combination for collecting Internet worm attacks
title_fullStr Using routers and honeypots in combination for collecting Internet worm attacks
title_full_unstemmed Using routers and honeypots in combination for collecting Internet worm attacks
title_sort using routers and honeypots in combination for collecting internet worm attacks
publisher CRC Press, Taylor & Francis Group, USA
publishDate 2014
url http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf
first_indexed 2023-09-18T20:49:10Z
last_indexed 2023-09-18T20:49:10Z
_version_ 1777409877875884032