Using routers and honeypots in combination for collecting Internet worm attacks

The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...

Full description

Bibliographic Details
Main Authors: Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan
Format: Book Chapter
Language:English
Published: CRC Press, Taylor & Francis Group, USA 2014
Subjects:
Online Access:http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf
_version_ 1848780850867470336
author Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
author_facet Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
author_sort Mohammed, Mohssen M. Z. E.
building IIUM Repository
collection Online Access
description The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value.
first_indexed 2025-11-14T15:40:14Z
format Book Chapter
id iium-34065
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:40:14Z
publishDate 2014
publisher CRC Press, Taylor & Francis Group, USA
recordtype eprints
repository_type Digital Repository
spelling iium-340652015-08-19T08:32:24Z http://irep.iium.edu.my/34065/ Using routers and honeypots in combination for collecting Internet worm attacks Mohammed, Mohssen M. Z. E. Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Different researchers may have their own definitions of what a honeypot is. This fact has created a great deal of confusion and miscommunication. Some think that it is a tool for deception whereas others consider it as a weapon to lure hackers, and still there are others who believe that it is simply another intrusion detection tool. Some believe a honeypot should emulate vulnerabilities. Others see it simply as a jail! There are also some who view honeypots as controlled production systems that attackers can break into. These various viewpoints have caused a lot of misunderstanding about what a honeypot is and thus have caused barriers to realizing their true value. CRC Press, Taylor & Francis Group, USA 2014 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) Using routers and honeypots in combination for collecting Internet worm attacks. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 47-84. ISBN 9781482203516 http://www.crcnetbase.com/doi/book/10.1201/b16390
spellingShingle QA75 Electronic computers. Computer science
Mohammed, Mohssen M. Z. E.
Pathan, Al-Sakib Khan
Using routers and honeypots in combination for collecting Internet worm attacks
title Using routers and honeypots in combination for collecting Internet worm attacks
title_full Using routers and honeypots in combination for collecting Internet worm attacks
title_fullStr Using routers and honeypots in combination for collecting Internet worm attacks
title_full_unstemmed Using routers and honeypots in combination for collecting Internet worm attacks
title_short Using routers and honeypots in combination for collecting Internet worm attacks
title_sort using routers and honeypots in combination for collecting internet worm attacks
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf