pith. the verified trust layer for science. sign in

arxiv: 1608.06249 · v1 · pith:772VD5RCnew · submitted 2016-08-22 · 💻 cs.CR · cs.NI

A Survey on Honeypot Software and Data Analysis

classification 💻 cs.CR cs.NI
keywords honeypotdatasoftwaresurveyanalyseanalysisextensivegive
0
0 comments X p. Extension
Add this Pith Number to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{772VD5RC}

Prints a linked pith:772VD5RC badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Enabling Transparent Cyber Threat Intelligence Combining Large Language Models and Domain Ontologies

    cs.CR 2025-08 unverdicted novelty 6.0

    Integrates LLMs with domain ontologies and SHACL constraints to produce accurate, explainable structured outputs from cybersecurity logs for threat intelligence.

  2. OntoLogX: Ontology-Guided Knowledge Graph Extraction from Cybersecurity Logs with Large Language Models

    cs.AI 2025-10 unverdicted novelty 5.0

    OntoLogX is a system that applies LLMs with ontology guidance, RAG, and iterative fixes to build valid knowledge graphs from cybersecurity logs and predict ATT&CK tactics from aggregated sessions.