TY - BOOK ID - 32941421 TI - Honeypot Frameworks and Their Applications: A New Framework AU - NG, Chee Keong. AU - Pan, Lei. AU - Xiang, Yang. PY - 2018 SN - 9811077398 981107738X PB - Singapore : Springer Singapore : Imprint: Springer, DB - UniCat KW - Computer security. KW - Malware (Computer software) KW - Prevention. KW - Computer science. KW - Computer organization. KW - Computer science KW - Computer simulation. KW - Computer Science. KW - Security. KW - Computer Systems Organization and Communication Networks. KW - Systems and Data Security. KW - Applications of Graph Theory and Complex Networks. KW - Math Applications in Computer Science. KW - Simulation and Modeling. KW - Mathematics. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Computer code, Malicious KW - Malevolent software KW - Malicious computer code KW - Malicious software KW - Software, Malevolent KW - Software, Malicious KW - Computer software KW - Data protection. KW - Computer network architectures. KW - Computer modeling KW - Computer models KW - Modeling, Computer KW - Models, Computer KW - Simulation, Computer KW - Electromechanical analogies KW - Mathematical models KW - Simulation methods KW - Model-integrated computing KW - Informatics KW - Science KW - Architectures, Computer network KW - Network architectures, Computer KW - Computer architecture KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Electronic data processing KW - Physics. KW - Computer science—Mathematics. KW - Natural philosophy KW - Philosophy, Natural KW - Physical sciences KW - Dynamics KW - Organization, Computer UR - https://www.unicat.be/uniCat?func=search&query=sysid:32941421 AB - This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems. ER -