This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Using Honeynets to Protect Large Enterprise Networks
November-December 2004 (vol. 2 no. 6)
pp. 73-75
John G. Levine, Georgia Institute of Technology
Julian B. Grizzard, Georgia Institute of Technology
Henry L. Owen, Georgia Institute of Technology
Installing a honeynet within large enterprise networks provides an additional security tool. Honeynets complement the use of firewalls and IDSs and help overcome some of the shortcomings inherent in those systems. In addition, honeynets can also serve as platforms for conducting computer security research and education.
Index Terms:
honeynet, honeypot, firewall
Citation:
John G. Levine, Julian B. Grizzard, Henry L. Owen, "Using Honeynets to Protect Large Enterprise Networks," IEEE Security & Privacy, vol. 2, no. 6, pp. 73-75, Nov.-Dec. 2004, doi:10.1109/MSP.2004.115
Usage of this product signifies your acceptance of the Terms of Use.