A method to obtain signatures from honeypots data
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Saved in:
Main Authors: | Chi, C.-H., Li, M., Liu, D. |
---|---|
Other Authors: | COMPUTER SCIENCE |
Format: | Article |
Published: |
2013
|
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/38937 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Automatic scheme to construct Snort rules from honeypots data
by: Li, X., et al.
Published: (2013) -
Lightweight deception systems using honeypot techniques
by: Lee, Timothy Kok Kiang
Published: (2018) -
Etude et analyse des attaques et des signatures d'attaques - Etude bibliographique des parades au DoS et DDoS - Etude des HoneyPots - Intégration des HoneyPots dans une architecture globale de protection
by: DOAN, Duy Thieu Hoa
Published: (2015) -
Distributed Honeypot log management and visualization of attacker geographical distribution
by: Vasaka Visoottiviseth, et al.
Published: (2018) -
PENERAPAN SISTEM KEAMANAN JARINGAN
INTRANET MENGGUNAKAN HONEYPOT
(STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH
PURWOKERTO)
by: , HARJONO, S.T., et al.
Published: (2012)