文献知网节
摘要:End users of computer networks are vulnerable to a growing number of threats posed by sophisticated online attack.The first step in mitigation and protection against online attacks is to understand the nature and tools of the attacks.Honeypots provide a platform by which online attacks can be investigated.They are versatile security tools designed on the principle of deception and deployed to perform a wide range of functionalities.Their functionalities range from data collection and information gathering on attacks targeting server side services or client applications and browsers,to malware collection,attack diversion and SPAM analysis.Based on the type of attack,honeypots with different architectures and interaction levels have been developed.Different components of honeypots have also been integrated to create hybrid honeypots to tackle drawbacks of each type.The aim of this paper is to illustrate the different designs of honeypots,their components and provide a brief study of their security features.
会议名称:

2011 1st International Conference on Network and Electronics Engineering(ICNEE 2011)

会议时间:

2011-09-16

会议地点:

Singapore

  • 专辑:

    信息科技

  • 专题:

    互联网技术

  • 分类号:

    TP393.08

  • 手机阅读
    即刻使用手机阅读
    第一步

    扫描二维码下载

    "移动知网-全球学术快报"客户端

    第二步

    打开“全球学术快报”

    点击首页左上角的扫描图标

    第三步

    扫描二维码

    手机同步阅读本篇文献

  • CAJ下载
  • PDF下载

下载手机APP用APP扫此码同步阅读该篇文章

温馨提示:阅读CAJ格式原文,请使用CAJ浏览器

下载:11 页码:150-155 页数:6 大小:531k

引文网络
  • 参考文献
  • 引证文献
  • 共引文献
  • 同被引文献
  • 二级参考文献
  • 二级引证文献
  • 批量下载
相关推荐
  • 相似文献
  • 读者推荐
  • 相关基金文献
  • 相关法规
  • 关联作者
  • 相关视频