• DocumentCode
    3254196
  • Title

    CATCH: Comparison and analysis of tools covering honeypots

  • Author

    Nagpal, Bharti ; Chauhan, Naresh ; Singh, Nanhay ; Sharma, Pratima

  • fYear
    2015
  • fDate
    19-20 March 2015
  • Firstpage
    783
  • Lastpage
    786
  • Abstract
    Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
  • Keywords
    computer network security; CATCH; catch malign activities; intruders; network interrupters; open source honeypots tools; Computers; Intrusion detection; Maintenance engineering; Operating systems; Organizations; Production; Honeypot tools; Honeypots; Production Honeypots; Research Honeypots;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
  • Conference_Location
    Ghaziabad
  • Type

    conf

  • DOI
    10.1109/ICACEA.2015.7164809
  • Filename
    7164809