Implementing honeypot LAN detection
Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap.The attacker then tried to attempt the server or important network parts through ports on the network.Regarding that situation, it will be cause some of the host on the n...
Saved in:
Main Author: | Amran, Salleh |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2005
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/3692/1/AMRAN_BIN_SALLEH.PDF http://umpir.ump.edu.my/id/eprint/3692/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
LAN searching system
by: Asyran Zarizi, Abdullah
Published: (2010) -
Honeypot setup for education / By Muhd Harith Fathillah Bin Shahabudin, QA 76.9 .A25 M952 2005
by: Shahabudin, Muhd Harith Fathillah
Published: (2005) -
Enhanced analysis of kippo-honeypot in cloud
by: Alzubaidi, Mohammed Abdullah Omar
Published: (2015) -
Analysis of effectiveness of honeypots in tracking botnets
by: Shooshtari , Mohammad Jorjor Zadeh
Published: (2010)