Regresar a Artículos Indexados
  • INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS// (VOL. 12, ISSUE 4)

    Volumen: 12, Numero: 4, Páginas: [15]p.

    A REVIEW OF THE CURRENT STATE OF HONEYNET ARCHITECTURES AND TOOLS

    Abstract

    Honeynets originated as a security tool designed to be tracked, attacked and compromised by hypothetical intruders. They consist of network environments and sets of applications, and after being installed and configured with all of these components, the Honeynet is ready to be attacked with the purpose of maintaining a controlled environment for the study of the events that occurred. Through the analysis of these events, it is possible to understand the objectives, tactics and interests that the attackers have for the proposed environment. This paper describes the state of the art of Honeynets, referring to architectures, Honeynet types, tools used in Honeynets, Honeynet models and applications in the real world that are focused on capturing information.


    Keywords


    Intrusion detection, Honeypot, Honeynets, Alert Correlation, Capture data, Network Security


    Resumen

    No disponible


    Palabras Clave


    No disponible





    Acceder