A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://www.mecs-press.org/ijcnis/ijcnis-v4-n10/IJCNIS-V4-N10-7.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
A Survey: Recent Advances and Future Trends in Honeypot Research
<span title="2012-09-01">2012</span>
<i title="MECS Publisher">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rwj7spciv5a47gdqqkgtmu7xvm" style="color: black;">International Journal of Computer Network and Information Security</a>
</i>
This paper presents a survey on recent advances in honeypot research from a review of 80+ papers on honeypots and related topics mostly published after year 2005. This paper summarizes 60 papers that had significant contribution to the field. In reviewing the literature, it became apparent that the research can be broken down into five major areas: new types of honeypots to cope with emergent new security threats, utilizing honeypot output data to improve the accuracy in threat detections,
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijcnis.2012.10.07">doi:10.5815/ijcnis.2012.10.07</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dlidikdrxfavhirshxm37avygq">fatcat:dlidikdrxfavhirshxm37avygq</a>
</span>
more »
... configuring honeypots to reduce the cost of maintaining honeypots as well as to improve the accuracy in threat detections, counteracting honeypot detections by attackers, and legal and ethical issues in using honeypots. Our literature reviews indicate that the advances in the first four areas reflect the recent changes in our networking environments, such as those in user demography and the ways those diverse users use new applications. Our literature reviews on legal and ethical issues in using honeypots reveals that there has not been widely accepted agreement on the legal and ethical issues about honeypots, which must be an important agenda in future honeypot research.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810193333/http://www.mecs-press.org/ijcnis/ijcnis-v4-n10/IJCNIS-V4-N10-7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/bb/7abbacbe20e442ce0c5f85bd77fee46dd06c0ff1.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijcnis.2012.10.07">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>