A clustered hybrid honeypot architecture

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, when computers and computer systems are almost omnipresent and are part of most households and most people have access to them, they are more vulnerable than ever. Today, protection and security of computer networks and systems using passive protection does not suffice anymore. One has to anticipate attacks and be a step ahead of the attackers. To achieve this type of security, one has to employ active protection techniques, such as digital baits – honeypots. The primary goal of using honeypots is to divert the interest of potential attackers from other really important targets within a particular computer network. The secondary goal is to acquire information about the attackers' activities and methods. Subsequently, these data are thoroughly analysed. By analysing the attacks, security improvement measures aimed at the particular network and/or computer system may be proposed in order to prevent threats. The goal of this paper is to contribute to computer security by proposing a clustered, high-interaction-honeypot-based security system.

Cite

CITATION STYLE

APA

Chovancová, E., & Ádám, N. (2019). A clustered hybrid honeypot architecture. Acta Polytechnica Hungarica, 16(10), 173–189. https://doi.org/10.12700/APH.16.10.2019.10.11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free