DocumentCode
3254196
Title
CATCH: Comparison and analysis of tools covering honeypots
Author
Nagpal, Bharti ; Chauhan, Naresh ; Singh, Nanhay ; Sharma, Pratima
fYear
2015
fDate
19-20 March 2015
Firstpage
783
Lastpage
786
Abstract
Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
Keywords
computer network security; CATCH; catch malign activities; intruders; network interrupters; open source honeypots tools; Computers; Intrusion detection; Maintenance engineering; Operating systems; Organizations; Production; Honeypot tools; Honeypots; Production Honeypots; Research Honeypots;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
Conference_Location
Ghaziabad
Type
conf
DOI
10.1109/ICACEA.2015.7164809
Filename
7164809
Link To Document