Lessons learned from the deployment of a high-interaction honeypot
E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
2006 Sixth European Dependable Computing Conference, 2006•ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six
months period during which a controlled experiment has been run with a high interaction
honeypot. We correlate our findings with those obtained with a worldwide distributed system
of low-interaction honeypots
the attackers when logged on a compromised machine. The results are based on a six
months period during which a controlled experiment has been run with a high interaction
honeypot. We correlate our findings with those obtained with a worldwide distributed system
of low-interaction honeypots
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots
ieeexplore.ieee.org
Showing the best result for this search. See all results