WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/13531,
	  title     = {Specification of a Model of Honeypot Attack Based On Raised Data},
	  author    = {Souleymane Oumtanaga and  Prosper Kimou and  Kouadio Gaza Kevin},
	  country	= {},
	  institution	= {},
	  abstract     = {The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication).
},
	    journal   = {International Journal of Information and Communication Engineering},
	  volume    = {2},
	  number    = {11},
	  year      = {2008},
	  pages     = {3871 - 3875},
	  ee        = {https://publications.waset.org/pdf/13531},
	  url   	= {https://publications.waset.org/vol/23},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 23, 2008},
	}