OU Portal
Log In
Welcome
Applicants
Z6_60GI02O0O8IDC0QEJUJ26TJDI4
Error:
Javascript is disabled in this browser. This page requires Javascript. Modify your browser's settings to allow Javascript to execute. See your browser's documentation for specific instructions.
{}
Close
Publikační činnost
Probíhá načítání, čekejte prosím...
publicationId :
tempRecordId :
actionDispatchIndex :
navigationBranch :
pageMode :
tabSelected :
isRivValid :
Record type:
stať ve sborníku (D)
Home Department:
Katedra informatiky a počítačů (31400)
Title:
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets
Citace
Zuzčák, M. a Sochor, T. Study of Internet Threats and Attack Methods Using Honeypots and Honeynets.
In:
Communications in Computer and Information Science.
Springer Verlag, 2014. s. 118-127. ISBN 978-331907940-0.
Subtitle
Publication year:
2014
Obor:
Informatika
Number of pages:
10
Page from:
118
Page to:
127
Form of publication:
Tištená verze
ISBN code:
978-3-319-07940-0
ISSN code:
1865-0929
Proceedings title:
Communications in Computer and Information Science
Proceedings:
Mezinárodní
Publisher name:
Springer Verlag
Place of publishing:
Neuveden
Country of Publication:
Sborník vydaný v zahraničí
Název konference:
Computer Networks 2014
Místo konání konference:
Brunow
Datum zahájení konference:
Typ akce podle státní
příslušnosti účastníků:
Celosvětová akce
WoS code:
000342808200012
EID:
Key words in English:
computer attack; Dionaea; honeynet; honeypot; Internet threat; Kippo; low-interaction honeypot; malware, Distributed computer systems; Internet; Security of data, Computer attacks; Dionaea; Honeynet; Honeypots; Kippo
Annotation in original language:
The number of threats from the Internet has been growing in the recent period and every user or administrator should protect against them. For choosing the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective tools for obtaining details about current and recent threats. The article gives an introduction into honeypots and honeynets and shows some interesting results from initial 3-months period of the implementation of a small honeynet made of 3 Dionaea and one Kippo low-interaction honeypots. Basic conclusions regarding the amount of currently actively spread malware and their type are formulated
Annotation in english language:
References
Reference
R01:
RIV/61988987:17310/14:A1601BHQ
Complementary Content
Deferred Modules
${title}
${badge}
${loading}
Deferred Modules