9789811077388-981107738X-Honeypot Frameworks and Their Applications: A New Framework (SpringerBriefs on Cyber Security Systems and Networks)

Honeypot Frameworks and Their Applications: A New Framework (SpringerBriefs on Cyber Security Systems and Networks)

ISBN-13: 9789811077388
ISBN-10: 981107738X
Edition: 1st ed. 2018
Author: Yang Xiang, Chee Keong NG, Lei Pan
Publication date: 2018
Publisher: Springer
Format: Paperback 93 pages
FREE US shipping
Rent
35 days
from $88.53 USD
FREE shipping on RENTAL RETURNS
Buy

From $18.00

Rent

From $88.53

Book details

ISBN-13: 9789811077388
ISBN-10: 981107738X
Edition: 1st ed. 2018
Author: Yang Xiang, Chee Keong NG, Lei Pan
Publication date: 2018
Publisher: Springer
Format: Paperback 93 pages

Summary

Honeypot Frameworks and Their Applications: A New Framework (SpringerBriefs on Cyber Security Systems and Networks) (ISBN-13: 9789811077388 and ISBN-10: 981107738X), written by authors Yang Xiang, Chee Keong NG, Lei Pan, was published by Springer in 2018. With an overall rating of 3.5 stars, it's a notable title among other Computer Simulation (Computer Science) books. You can easily purchase or rent Honeypot Frameworks and Their Applications: A New Framework (SpringerBriefs on Cyber Security Systems and Networks) (Paperback) from BooksRun, along with many other new and used Computer Simulation books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks.

The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book