Statements (26)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_deception_technology
|
| gptkbp:canBe |
gptkb:software
hardware system high-interaction low-interaction production honeypot research honeypot |
| gptkbp:example |
gptkb:Dionaea
Glastopf Honeyd KFSensor |
| gptkbp:firstDescribed |
1990s
|
| gptkbp:monitors |
malicious activity
|
| gptkbp:notableCollection |
attack data
|
| gptkbp:purpose |
detect unauthorized access
divert attackers study attacker behavior |
| gptkbp:relatedTo |
gptkb:intrusion_prevention_system
network security cyber threat intelligence |
| gptkbp:requires |
careful deployment
|
| gptkbp:riskFactor |
can be compromised
|
| gptkbp:usedIn |
computer security
|
| gptkbp:bfsParent |
gptkb:Beat_Happening_(album)
|
| gptkbp:bfsLayer |
9
|
| https://www.w3.org/2000/01/rdf-schema#label |
Honey Pot
|