Share Email Print

Proceedings Paper

Author(s): Chris Brenton
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Over the last year, network-based intrusion have increased exponentially, due to the popularity of scripted or automated attack tools. This increase in intrusions has rekindled interest in honeypot systems, which can be used to trap and decode the attack methods used by the black hat community. This paper will review the current state of honeypot technology as well as describe methods of deploying entire honeypot networks.

Paper Details

Date Published: 21 February 2001
PDF: 8 pages
Proc. SPIE 4232, Enabling Technologies for Law Enforcement and Security, (21 February 2001); doi: 10.1117/12.417523
Show Author Affiliations
Chris Brenton, Dartmouth College (United States)

Published in SPIE Proceedings Vol. 4232:
Enabling Technologies for Law Enforcement and Security
Simon K. Bramble; Lenny I. Rudin; Simon K. Bramble; Edward M. Carapezza; Lenny I. Rudin, Editor(s)

© SPIE. Terms of Use
Back to Top