skip to content
Honeypot frameworks and their applications : a new framework Preview this item
ClosePreview this item
Checking...

Honeypot frameworks and their applications : a new framework

Author: Chee Keong Ng; Lei Pan; Yang Xiang, (Computer scientist)
Publisher: Singapore : Springer, 2018.
Series: SpringerBriefs on cyber security systems and networks.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Ng, Chee Keong.
Honeypot frameworks and their applications.
Singapore : Springer, 2018
(OCoLC)1013181744
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Chee Keong Ng; Lei Pan; Yang Xiang, (Computer scientist)
ISBN: 9789811077395 9811077398
OCLC Number: 1035556386
Description: 1 online resource (xii, 82 pages) : illustrations.
Contents: 1 Honeypot Introductory --
2 Honeypot --
3 The Application of Honeypot --
4 Detecting Honeypots and their Counter-measure --
5 Ramsonware and Honeypot --
6 Honeypot Frameworks --
7 Conclusion and Future Work.
Series Title: SpringerBriefs on cyber security systems and networks.
Responsibility: Chee Keong Ng, Lei Pan, Yang Xiang.

Abstract:

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1035556386> # Honeypot frameworks and their applications : a new framework
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "1035556386" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/si> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computers_security_viruses_&_malware> ; # COMPUTERS--Security--Viruses & Malware
    schema:about <http://experiment.worldcat.org/entity/work/data/5289280937#Topic/malware_computer_software_prevention> ; # Malware (Computer software)--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computer_security> ; # Computer security
    schema:author <http://experiment.worldcat.org/entity/work/data/5289280937#Person/xiang_yang_computer_scientist> ; # (Computer scientist) Yang Xiang
    schema:author <http://experiment.worldcat.org/entity/work/data/5289280937#Person/pan_lei> ; # Lei Pan
    schema:author <http://experiment.worldcat.org/entity/work/data/5289280937#Person/ng_chee_keong> ; # Chee Keong Ng
    schema:bookFormat schema:EBook ;
    schema:datePublished "2018" ;
    schema:description "1 Honeypot Introductory -- 2 Honeypot -- 3 The Application of Honeypot -- 4 Detecting Honeypots and their Counter-measure -- 5 Ramsonware and Honeypot -- 6 Honeypot Frameworks -- 7 Conclusion and Future Work."@en ;
    schema:description "This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5289280937> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/2522-5561> ; # SpringerBriefs on cyber security systems and networks,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/5289280937#Series/springerbriefs_on_cyber_security_systems_and_networks> ; # SpringerBriefs on cyber security systems and networks.
    schema:isSimilarTo <http://www.worldcat.org/oclc/1013181744> ;
    schema:name "Honeypot frameworks and their applications : a new framework"@en ;
    schema:productID "1035556386" ;
    schema:url <https://link.springer.com/10.1007/978-981-10-7739-5> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1806771> ;
    schema:url <http://dx.doi.org/10.1007/978-981-10-7739-5> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-981-10-7739-5> ;
    schema:url <http://link.springer.com/10.1007/978-981-10-7739-5> ;
    schema:workExample <http://dx.doi.org/10.1007/978-981-10-7739-5> ;
    schema:workExample <http://worldcat.org/isbn/9789811077395> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1035556386> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5289280937#Person/ng_chee_keong> # Chee Keong Ng
    a schema:Person ;
    schema:familyName "Ng" ;
    schema:givenName "Chee Keong" ;
    schema:name "Chee Keong Ng" ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Person/xiang_yang_computer_scientist> # (Computer scientist) Yang Xiang
    a schema:Person ;
    schema:familyName "Xiang" ;
    schema:givenName "Yang" ;
    schema:name "(Computer scientist) Yang Xiang" ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Series/springerbriefs_on_cyber_security_systems_and_networks> # SpringerBriefs on cyber security systems and networks.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1035556386> ; # Honeypot frameworks and their applications : a new framework
    schema:name "SpringerBriefs on cyber security systems and networks." ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Topic/computers_security_viruses_&_malware> # COMPUTERS--Security--Viruses & Malware
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Viruses & Malware"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5289280937#Topic/malware_computer_software_prevention> # Malware (Computer software)--Prevention
    a schema:Intangible ;
    schema:name "Malware (Computer software)--Prevention"@en ;
    .

<http://worldcat.org/isbn/9789811077395>
    a schema:ProductModel ;
    schema:isbn "9811077398" ;
    schema:isbn "9789811077395" ;
    .

<http://worldcat.org/issn/2522-5561> # SpringerBriefs on cyber security systems and networks,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1035556386> ; # Honeypot frameworks and their applications : a new framework
    schema:issn "2522-5561" ;
    schema:name "SpringerBriefs on cyber security systems and networks," ;
    .

<http://www.worldcat.org/oclc/1013181744>
    a schema:CreativeWork ;
    rdfs:label "Honeypot frameworks and their applications." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1035556386> ; # Honeypot frameworks and their applications : a new framework
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.