Sahraie Kalejahi, Masumeh Network security using honeypot. Nama, 2005, vol. 5, n. 2. [Journal article (Unpaginated)]
Preview |
PDF
kalejahi.pdf Download (176kB) | Preview |
English abstract
We always hear news about hacker's being arrested or a group of internet saboteurs discovered. Hacking techniques have improved to the point that little or no traces of unauthorized access is left. Computer security experts often use a tool called honeypot to entrap intruders. The present paper outlines honeypot techniques, its variants and various technologies applied to this effect.
Item type: | Journal article (Unpaginated) |
---|---|
Keywords: | Hackers, Computer security, Intruder detection entrapment |
Subjects: | L. Information technology and library technology > LH. Computer and network security. |
Depositing user: | Mahmoud Babaie |
Date deposited: | 23 Oct 2006 |
Last modified: | 02 Oct 2014 12:04 |
URI: | http://hdl.handle.net/10760/8262 |
References
Downloads
Downloads per month over past year
Actions (login required)
View Item |