The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Honeypots and Honeynets: Analysis and Case Study
Abstract
This chapter presents a review and a case of study of honeypots and honeynets. First, some of the most important and widely used honeypots in the current market are selected for comparative analysis, evaluating their interaction capacity with an attacker. Second, a self-contained honeynet architecture is implemented with virtual machines. An intrusion test is performed against the honeynet to observe the quality and quantity of the information collected during the attack. The final goal of this analysis is to assess the capacity of monitoring and threat detection of the honeynets and honeypots.
Related Content
Hossam Nabil Elshenraki.
© 2024.
23 pages.
|
Ibtesam Mohammed Alawadhi.
© 2024.
9 pages.
|
Akashdeep Bhardwaj.
© 2024.
33 pages.
|
John Blake.
© 2024.
12 pages.
|
Wasswa Shafik.
© 2024.
36 pages.
|
Amar Yasser El-Bably.
© 2024.
12 pages.
|
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav.
© 2024.
23 pages.
|
|
|