Honeypots have gained a significant place in the overall intrusion protection

Honeypots have gained a significant place in the

This preview shows page 9 - 10 out of 10 pages.

- While the real network remains safe and sound. Honeypots have gained a significant place in the overall intrusion protection strategy of enterprise. Security experts do not recommend that these systems replace existing intrusion detection security technologies; they see honeypots as complementary technology to network-and host based intrusion protection. The advantages that honeypots bring to intrusion protection strategies are hard to ignore. In time, as security managers understand the benefits, honeypots will become an essential ingredient in an enterprise level security operation. We do believe that although honeypots have legal issues now, they do provide beneficial information regarding the security of a network. It is formulated to foster and support research in this area. This will help to solve the current challenges and make it possible to use honeypots for the benefit of the broader internet community. REFERENCES Maximillian Dornseif, Thorsten Holz, and Sven M •uller. Honeypots and limitations of deception. Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu and Shengli Liu, “Collecting Internet Malware Based on Client- side Honeypot”, 9th IEEE International Conference for Young Computer Scientists (ICVCS 2008), pp. 1493 1498, 2008. C. H. Nick Jap, P. Blanchfield, and K. S. Daniel Su, “The use of honeypot approach in software -based application protection for shareware programs”, IEEE International Conference on Computing & Informatics, (ICOCI '06), pp. 1-7, 2006. Jian Bao and Chang-peng Ji, and Mo Gao, “Research on network security of defense based on Honeypot”, IEEE International Conference on Computer Application and System Modeling (ICCASM), vol. 10, pp. V10-299 - V10-302, 2010. Anjali Sardana, R. C. Joshi, “Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level”, IEEE International Symposiums on Information Processing (ISIP), pp. 505-509, 2008. Guanlin Chen, Hui Yao and Zebing Wang, “Research of Wireless Intrusion Prevention Systems based on Plan Recognition and Honeypot”, IEEE International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1-5,
Image of page 9

Subscribe to view the full document.

Image of page 10
  • Fall '19
  • sir kashif

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask bonus questions You can ask questions ( expire soon) You can ask questions (will expire )
Answers in as fast as 15 minutes