A survey of windows based honeypots and program for honeypot log analysis / Asma Raayatiezhad

Honeypots are computers that attract attackers to penetrate itself. They are security tools for monitor and identify unauthorized activity. The value of Honeypots is in being hacked. They don‟t have any data, so any traffic to or from them is most unauthorized activity. In fact Honeypots are compute...

Full description

Saved in:
Bibliographic Details
Main Author: Raayatiezhad, Asma
Format: Thesis
Language:English
Published: 2011
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/110698/1/110698.pdf
https://ir.uitm.edu.my/id/eprint/110698/
Tags: Add Tag
No Tags, Be the first to tag this record!