Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
Authors:
Abstract:

This paper proposes an implementation of Honeypot system that uses dynamic resource management method based on potential attacks graph to enable the deployment of a virtual network infrastructure of any scale. Its resource consumption with a traditional Honeypot system is compared