Abstract | ||
---|---|---|
Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies. |
Year | Venue | Keywords |
---|---|---|
2005 | Australian Computer, Network & Information Forensics Conference | misuse,honeypot,firewall,ids,internal,near real time |
Field | DocType | Citations |
Countermeasure,Honeypot,World Wide Web,Software deployment,Firewall (construction),Computer security,Archetype,Pseudoserver,Engineering | Conference | 0 |
PageRank | References | Authors |
0.34 | 2 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Craig Valli | 1 | 132 | 33.90 |