Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]

Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd Fuzi, Mohd Faris, Mazlan, Muhammad Fahimuddin, Jamaluddin, Muhammad Nabil Fikri, Abd Halim, Iman Hazwam
Format: Article
Language:English
Published: UiTM Cawangan Perlis 2024
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf
https://ir.uitm.edu.my/id/eprint/103968/
https://jcrinn.com/index.php/jcrinn
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first