Cargando…

Containerized cloud-based honeypot deception for tracking attackers

Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more d...

Descripción completa

Detalles Bibliográficos
Autores principales: Priya, V. S. Devi, Chakkaravarthy, S. Sibi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9876893/
https://www.ncbi.nlm.nih.gov/pubmed/36697488
http://dx.doi.org/10.1038/s41598-023-28613-0