Abstract | ||
---|---|---|
This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize it's advantages and disadvantages, as well as legal and ethical issues. We classify honeypots to different categories and present examples of both actively developed honeypots and ones that had a significant impact. Finally, we discuss the current challenges in this field. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/ICUMT48472.2019.8970921 | 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) |
Keywords | Field | DocType |
honeypot,honeynet,deception,cybersecurity,threat intelligence | Honeypot,Threat intelligence,Ethical issues,Computer science,Deception,Computer security,Phenomenon | Conference |
ISSN | ISBN | Citations |
2157-0221 | 978-1-7281-5765-8 | 0 |
PageRank | References | Authors |
0.34 | 15 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lukás Zobal | 1 | 0 | 0.34 |
Dusan Kolár | 2 | 0 | 0.34 |
Radek Fujdiak | 3 | 45 | 11.17 |