{"title":"无线传感器网络蜜罐框架","authors":"J. Markert, M. Massoth","doi":"10.1145/2536853.2536941","DOIUrl":null,"url":null,"abstract":"In the field of wireless sensor networks there is a course to develop methods for tracking intrusions and unauthorised access by an attacker as well as detecting attempted attacks against the stability of wireless sensor networks, by using intrusion detection systems. So far, very little research has been done in the development of honeypots. Such systems represent the current state of the art in the field of research on detecting attacks on wireless sensor networks. It is considered that insufficient research has been conducted in the development of wireless sensor network honeypots, thus offering not enough opportunities for specific analysis and intercepting attacks.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Honeypot Framework for Wireless Sensor Networks\",\"authors\":\"J. Markert, M. Massoth\",\"doi\":\"10.1145/2536853.2536941\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the field of wireless sensor networks there is a course to develop methods for tracking intrusions and unauthorised access by an attacker as well as detecting attempted attacks against the stability of wireless sensor networks, by using intrusion detection systems. So far, very little research has been done in the development of honeypots. Such systems represent the current state of the art in the field of research on detecting attacks on wireless sensor networks. It is considered that insufficient research has been conducted in the development of wireless sensor network honeypots, thus offering not enough opportunities for specific analysis and intercepting attacks.\",\"PeriodicalId\":135195,\"journal\":{\"name\":\"Advances in Mobile Multimedia\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Mobile Multimedia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2536853.2536941\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Mobile Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2536853.2536941","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the field of wireless sensor networks there is a course to develop methods for tracking intrusions and unauthorised access by an attacker as well as detecting attempted attacks against the stability of wireless sensor networks, by using intrusion detection systems. So far, very little research has been done in the development of honeypots. Such systems represent the current state of the art in the field of research on detecting attacks on wireless sensor networks. It is considered that insufficient research has been conducted in the development of wireless sensor network honeypots, thus offering not enough opportunities for specific analysis and intercepting attacks.