Study on Application and Design of Honeypot Technology
Tian Bin, Changhong Yu
Available Online July 2015.
- https://doi.org/10.2991/lemcs-15.2015.159How to use a DOI?
- Honeypot; Application honeypot; Investigation honeypot; Hacker; Network security
- This paper introduces the history of honeypot technology and its classification according to different criterions, and then gives the design principles of honeypot. The building principles of application and investigation honeypots are explained and a typical honeypot –DTK is given. Finally, this paper discusses the developing trends of honeypot technology.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Tian Bin AU - Changhong Yu PY - 2015/07 DA - 2015/07 TI - Study on Application and Design of Honeypot Technology BT - International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) PB - Atlantis Press SP - 809 EP - 811 SN - 1951-6851 UR - https://doi.org/10.2991/lemcs-15.2015.159 DO - https://doi.org/10.2991/lemcs-15.2015.159 ID - Bin2015/07 ER -