Cargando…
Containerized cloud-based honeypot deception for tracking attackers
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more d...
Autores principales: | Priya, V. S. Devi, Chakkaravarthy, S. Sibi |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9876893/ https://www.ncbi.nlm.nih.gov/pubmed/36697488 http://dx.doi.org/10.1038/s41598-023-28613-0 |
Ejemplares similares
-
Honeypots: tracking hackers
por: Spitzner, Lance
Publicado: (2003) -
Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots
por: Katakwar, Harsh, et al.
Publicado: (2020) -
A Comparative Analysis of Honeypots on Different Cloud Platforms
por: Kelly, Christopher, et al.
Publicado: (2021) -
Honeypot Resurrection - Redesign of CERN's Security Honeypots
por: Buschendorf, Fabiola
Publicado: (2018) -
Honeypot Resurrection - Redesign of CERN’s Security Honeypots
por: Buschendorf, Fabiola
Publicado: (2018)