Using routers and honeypots in combination for collecting Internet worm attacks
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book Chapter |
| Language: | en |
| Published: |
CRC Press, Taylor & Francis Group, USA
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf http://irep.iium.edu.my/34065/ http://www.crcnetbase.com/doi/book/10.1201/b16390 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!
