Abstract
This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker. © 2009 Springer Berlin Heidelberg.
Author supplied keywords
Cite
CITATION STYLE
Panchal, V. K., Bhatnagar, P. K., & Bhatnagar, M. (2009). Pitcherpot: Avoiding honeypot detection. In Communications in Computer and Information Science (Vol. 40, pp. 615–624). https://doi.org/10.1007/978-3-642-03547-0_58
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.