Using routers and honeypots in combination for collecting Internet worm attacks
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...
Disimpan dalam:
| Pengarang-pengarang Utama: | , |
|---|---|
| Format: | Bab Buku |
| Bahasa: | English |
| Diterbitkan: |
CRC Press, Taylor & Francis Group, USA
2014
|
| Subjek-subjek: | |
| Capaian Atas Talian: | http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf |
| Penanda-penanda: |
Tambah Penanda
Tiada Penanda, Jadilah orang pertama menanda rekod ini!
|