Study on Application and Design of Honeypot Technology
Tian Bin, Changhong Yu
Available Online July 2015.
- 10.2991/lemcs-15.2015.159How to use a DOI?
- Honeypot; Application honeypot; Investigation honeypot; Hacker; Network security
This paper introduces the history of honeypot technology and its classification according to different criterions, and then gives the design principles of honeypot. The building principles of application and investigation honeypots are explained and a typical honeypot –DTK is given. Finally, this paper discusses the developing trends of honeypot technology.
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Tian Bin AU - Changhong Yu PY - 2015/07 DA - 2015/07 TI - Study on Application and Design of Honeypot Technology BT - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science PB - Atlantis Press SP - 809 EP - 811 SN - 1951-6851 UR - https://doi.org/10.2991/lemcs-15.2015.159 DO - 10.2991/lemcs-15.2015.159 ID - Bin2015/07 ER -