DocumentCode :
3254196
Title :
CATCH: Comparison and analysis of tools covering honeypots
Author :
Nagpal, Bharti ; Chauhan, Naresh ; Singh, Nanhay ; Sharma, Pratima
fYear :
2015
fDate :
19-20 March 2015
Firstpage :
783
Lastpage :
786
Abstract :
Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
Keywords :
computer network security; CATCH; catch malign activities; intruders; network interrupters; open source honeypots tools; Computers; Intrusion detection; Maintenance engineering; Operating systems; Organizations; Production; Honeypot tools; Honeypots; Production Honeypots; Research Honeypots;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
Conference_Location :
Ghaziabad
Type :
conf
DOI :
10.1109/ICACEA.2015.7164809
Filename :
7164809
Link To Document :
بازگشت