Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches...
Saved in:
Main Authors: | Mohd Fuzi, Mohd Faris, Mazlan, Muhammad Fahimuddin, Jamaluddin, Muhammad Nabil Fikri, Abd Halim, Iman Hazwam |
---|---|
Format: | Article |
Language: | English |
Published: |
UiTM Cawangan Perlis
2024
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf https://ir.uitm.edu.my/id/eprint/103968/ https://jcrinn.com/index.php/jcrinn |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
by: Mohd Fuzi, Mohd Faris, et al.
Published: (2023) -
Performance analysis of open-source network monitoring software in wireless network / Mohd Faris Mohd Fuzi ... [et al.]
by: Mohd Fuzi, Mohd Faris, et al.
Published: (2023) -
Sinkhole attack in IDS: detection and performance analysis for agriculture-based WSN using cooja network simulator / Iman Hazwam Abd Halim, Mohamad Hafiz Abdul Azziz and Mohd Faris Mohd Fuzi
by: Abd Halim, Iman Hazwam, et al.
Published: (2021) -
Reducing honeypot log storage capacity consumption – cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.]
by: Abd Halim, Iman Hazwam, et al.
Published: (2019) -
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
by: Suhaimi, Hamizan
Published: (2021)