Autor: |
Abubakar Zakari, Girish Bekaroo, Abdulmalik Ahmad Lawan |
Přispěvatelé: |
Fleming, Peter, Vyas, Nalinaksh, Sanei, Saeid, Deb, Kalyanmoy |
Rok vydání: |
2017 |
Předmět: |
|
Zdroj: |
Emerging Trends in Electrical, Electronic and Communications Engineering ISBN: 9783319521701 |
ISSN: |
1876-1100 |
DOI: |
10.1007/978-3-319-52171-8_28 |
Popis: |
The recent increase in the number of security attacks by cyber-criminals on small businesses meant that security remained a concern for such organizations. In many such cases, detecting the attackers remained a challenge. A common tool to augment existing attack detection mechanisms within networks involves the use of honeypot systems. A fundamental feature of low-interaction honeypots is to be able to lure intruders, but the effectiveness of such systems has nevertheless been affected by various constraints. To be able to secure honeypots systems, it is important to firstly determine its requirements, before taking appropriate actions to ensure that the identified requirements have been achieved. This paper critically examines how existing low-interaction honeypot systems abide to major requirements before recommending how their security could be improved. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|