Title :
CATCH: Comparison and analysis of tools covering honeypots
Author :
Nagpal, Bharti ; Chauhan, Naresh ; Singh, Nanhay ; Sharma, Pratima
Abstract :
Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
Keywords :
computer network security; CATCH; catch malign activities; intruders; network interrupters; open source honeypots tools; Computers; Intrusion detection; Maintenance engineering; Operating systems; Organizations; Production; Honeypot tools; Honeypots; Production Honeypots; Research Honeypots;
Conference_Titel :
Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
Conference_Location :
Ghaziabad
DOI :
10.1109/ICACEA.2015.7164809