Honey Plotter and the Web of Terror
Honeypots are a useful tool for discovering the distribution of malicious traffic on the Internet and how that traffic evolves over time. In addition, they allow an insight into new attacks appearing. One major problem is analysing the large amounts of data generated by such honeypots and correlatin...
Saved in:
Main Authors: | Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain W. Phillips |
---|---|
Format: | Default Text |
Published: |
2007
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/3918 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by: Schneier, Bruce, 1963-
Published: (2015) -
Security for telecommunications network management / Moshe Rozenblit.
by: Rozenblit, Moshe, 1944-
Published: (2000) -
Security for telecommunications network management Moshe Rozenblit.
by: Rozenblit, Moshe, 1944-
Published: (2000) -
Network visualization : a review
by: Mark S. Withall, et al.
Published: (2007) -
Security in cyberspace : targeting nations, infrastructures, individuals / edited by Giampiero Giacomello.
Published: (2016)