An extensive study of honeypot technique

0Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Honeypots have been utilized broadly for more than two decades. Notwithstanding, their improvement is infrequently went with a comprehension of how assailants can distinguish them. Further, our comprehension of successful avoidance methodologies that counteract the identification of honeypots is constrained. We present an arrangement of honeypot attributes just as honeypot discovery avoidance methodologies which limit the recognition paces of honeypots. We likewise give suggestions to future honeypot programming which is progressively versatile, secluded and consolidate a dynamic insight structure.

Cite

CITATION STYLE

APA

Althobaiti, A. H., Alzain, M. A., Al-Amri, J., Baz, M., & Masud, M. (2019). An extensive study of honeypot technique. International Journal of Advanced Trends in Computer Science and Engineering, 8(6), 3318–3326. https://doi.org/10.30534/ijatcse/2019/103862019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free