Pitcherpot: Avoiding honeypot detection

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Panchal, V. K., Bhatnagar, P. K., & Bhatnagar, M. (2009). Pitcherpot: Avoiding honeypot detection. In Communications in Computer and Information Science (Vol. 40, pp. 615–624). https://doi.org/10.1007/978-3-642-03547-0_58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free