Cargando…
Hornet 40: Network dataset of geographically placed honeypots
Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot. However, very few is known about the impact of the geographical location of honeypots on the amount and type...
Autores principales: | Valeros, Veronica, Garcia, Sebastian |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8749222/ https://www.ncbi.nlm.nih.gov/pubmed/35036492 http://dx.doi.org/10.1016/j.dib.2022.107795 |
Ejemplares similares
-
Honeypot Resurrection - Redesign of CERN's Security Honeypots
por: Buschendorf, Fabiola
Publicado: (2018) -
Honeypot Resurrection - Redesign of CERN’s Security Honeypots
por: Buschendorf, Fabiola
Publicado: (2018) -
Quantum Honeypots
por: Nagy, Naya, et al.
Publicado: (2023) -
Honeypot frameworks and their applications
por: NG, Chee Keong, et al.
Publicado: (2018) -
Honeypots: tracking hackers
por: Spitzner, Lance
Publicado: (2003)