{"title":"蜜罐作为创建有效安全系统的工具","authors":"A. Arkhipova, Danila Karevskiy","doi":"10.17212/2782-2230-2021-2-122-135","DOIUrl":null,"url":null,"abstract":"In the presente work, the theoretical aspects of honeypot systems were considered, and the classification of honeypots on various grounds was presented. The architecture of a honeypot system is presented, designed to investigate the behavior of an attacker after his penetration into the corporate system, as a tool for implementing a complex effective secure system of the organization.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Honeypot as a tool for creating an effective secure system\",\"authors\":\"A. Arkhipova, Danila Karevskiy\",\"doi\":\"10.17212/2782-2230-2021-2-122-135\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the presente work, the theoretical aspects of honeypot systems were considered, and the classification of honeypots on various grounds was presented. The architecture of a honeypot system is presented, designed to investigate the behavior of an attacker after his penetration into the corporate system, as a tool for implementing a complex effective secure system of the organization.\",\"PeriodicalId\":207311,\"journal\":{\"name\":\"Digital Technology Security\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Technology Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/2782-2230-2021-2-122-135\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2021-2-122-135","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Honeypot as a tool for creating an effective secure system
In the presente work, the theoretical aspects of honeypot systems were considered, and the classification of honeypots on various grounds was presented. The architecture of a honeypot system is presented, designed to investigate the behavior of an attacker after his penetration into the corporate system, as a tool for implementing a complex effective secure system of the organization.