Study of Internet Threats and Attack Methods Using Honeypots and Honeynets
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61988987%3A17310%2F14%3AA1601BHQ" target="_blank" >RIV/61988987:17310/14:A1601BHQ - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets
Original language description
The number of threats from the Internet has been growing in the recent period and every user or administrator should protect against them. For choosing the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective tools for obtaining details about current and recent threats. The article gives an introduction into honeypots and honeynets and shows some interesting results from initial 3-months period of the implementation of a small honeynet madeof 3 Dionaea and one Kippo low-interaction honeypots. Basic conclusions regarding the amount of currently actively spread malware and their type are formulated
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2014
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Communications in Computer and Information Science
ISBN
978-3-319-07940-0
ISSN
1865-0929
e-ISSN
—
Number of pages
10
Pages from-to
118-127
Publisher name
Springer Verlag
Place of publication
—
Event location
Brunow
Event date
Jun 23, 2014
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000342808200012