Using routers and honeypots in combination for collecting Internet worm attacks
The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...
Main Authors: | Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
CRC Press, Taylor & Francis Group, USA
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/ http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf |
Similar Items
-
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012) -
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013) -
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013) -
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)