A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Enhancing network intrusion detection system with honeypot
TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region
Traditionally, the strategy to defend one's organization as best as possible is to detect any failures in the defense, and then react to those failures. The problem with this approach is that it is purely defensive; the enemy is on the attack. Honeypots attempt to change this; they give the organizations the ability to take the initiative. Honeypots help to explore new vulnerabilities in an organization and defining the security policy of an organization. A honeypot is used in the area of
doi:10.1109/tencon.2003.1273174
fatcat:vkqgf6oyurg2dapqzxhmiffiii