A survey of windows based honeypots and program for honeypot log analysis / Asma Raayatiezhad
Honeypots are computers that attract attackers to penetrate itself. They are security tools for monitor and identify unauthorized activity. The value of Honeypots is in being hacked. They don‟t have any data, so any traffic to or from them is most unauthorized activity. In fact Honeypots are compute...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/110698/1/110698.pdf https://ir.uitm.edu.my/id/eprint/110698/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|