Using routers and honeypots in combination for collecting Internet worm attacks

The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan
Format: Book Chapter
Language:en
Published: CRC Press, Taylor & Francis Group, USA 2014
Subjects:
Online Access:http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf
http://irep.iium.edu.my/34065/
http://www.crcnetbase.com/doi/book/10.1201/b16390
Tags: Add Tag
No Tags, Be the first to tag this record!