Catching Flies: A Guide to the Various Flavors of Honeypots

While the concept of baiting adversaries in order to monitor their activities is nothing new, honeypotting has evolved into a critical tool in information security analysis. Recent years have given rise to advances in the detection of network intrusions such as honeynets, honeytokens and adaptive...
By Scott Smith
April 19, 2016

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg