The authors are developing a honeypot-system of increased scalability, as well as individual false objects of attacks in its structure. The obtained experimental results allow to talk about unprecedented volumes of attacks on devices having external access via Internet.
ABOUT DECOYS IN INFORMATION SYSTEMS
2017
Article (Journal)
Electronic Resource
Unknown
false objects , attacks , honeypot , telnet , ssh , Electronics , TK7800-8360
Metadata by DOAJ is licensed under CC BY-SA 1.0
Online Contents | 1993
|IEEE | 1993
|Spread of Decoys from a Ballistic Missile
NTIS | 1964
|Predictive Guidance for Pursuit-Evasion Engagements Involving Multiple Decoys
Online Contents | 2007
|