Abstract
Honeypots have been utilized broadly for more than two decades. Notwithstanding, their improvement is infrequently went with a comprehension of how assailants can distinguish them. Further, our comprehension of successful avoidance methodologies that counteract the identification of honeypots is constrained. We present an arrangement of honeypot attributes just as honeypot discovery avoidance methodologies which limit the recognition paces of honeypots. We likewise give suggestions to future honeypot programming which is progressively versatile, secluded and consolidate a dynamic insight structure.
Author supplied keywords
Cite
CITATION STYLE
Althobaiti, A. H., Alzain, M. A., Al-Amri, J., Baz, M., & Masud, M. (2019). An extensive study of honeypot technique. International Journal of Advanced Trends in Computer Science and Engineering, 8(6), 3318–3326. https://doi.org/10.30534/ijatcse/2019/103862019
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.