Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Study on Application and Design of Honeypot Technology

Authors
Tian Bin, Changhong Yu
Corresponding Author
Tian Bin
Available Online July 2015.
DOI
10.2991/lemcs-15.2015.159How to use a DOI?
Keywords
Honeypot; Application honeypot; Investigation honeypot; Hacker; Network security
Abstract

This paper introduces the history of honeypot technology and its classification according to different criterions, and then gives the design principles of honeypot. The building principles of application and investigation honeypots are explained and a typical honeypot –DTK is given. Finally, this paper discusses the developing trends of honeypot technology.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
Series
Advances in Intelligent Systems Research
Publication Date
July 2015
ISBN
10.2991/lemcs-15.2015.159
ISSN
1951-6851
DOI
10.2991/lemcs-15.2015.159How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Tian Bin
AU  - Changhong Yu
PY  - 2015/07
DA  - 2015/07
TI  - Study on Application and Design of Honeypot Technology
BT  - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
PB  - Atlantis Press
SP  - 809
EP  - 811
SN  - 1951-6851
UR  - https://doi.org/10.2991/lemcs-15.2015.159
DO  - 10.2991/lemcs-15.2015.159
ID  - Bin2015/07
ER  -