Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Study on Application and Design of Honeypot Technology

Authors
Tian Bin, Changhong Yu
Corresponding Author
Tian Bin
Available Online July 2015.
DOI
https://doi.org/10.2991/lemcs-15.2015.159How to use a DOI?
Keywords
Honeypot; Application honeypot; Investigation honeypot; Hacker; Network security
Abstract
This paper introduces the history of honeypot technology and its classification according to different criterions, and then gives the design principles of honeypot. The building principles of application and investigation honeypots are explained and a typical honeypot –DTK is given. Finally, this paper discusses the developing trends of honeypot technology.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015)
Part of series
Advances in Intelligent Systems Research
Publication Date
July 2015
ISBN
978-94-6252-102-5
ISSN
1951-6851
DOI
https://doi.org/10.2991/lemcs-15.2015.159How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Tian Bin
AU  - Changhong Yu
PY  - 2015/07
DA  - 2015/07
TI  - Study on Application and Design of Honeypot Technology
BT  - International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015)
PB  - Atlantis Press
SP  - 809
EP  - 811
SN  - 1951-6851
UR  - https://doi.org/10.2991/lemcs-15.2015.159
DO  - https://doi.org/10.2991/lemcs-15.2015.159
ID  - Bin2015/07
ER  -