The authors are developing a honeypot-system of increased scalability, as well as individual false objects of attacks in its structure. The obtained experimental results allow to talk about unprecedented volumes of attacks on devices having external access via Internet.


    Access

    Download


    Export, share and cite



    Title :

    ABOUT DECOYS IN INFORMATION SYSTEMS


    Contributors:


    Publication date :

    2017




    Type of media :

    Article (Journal)


    Type of material :

    Electronic Resource


    Language :

    Unknown




    Analysis of Towed Decoys

    Kerins, W.J. | Online Contents | 1993


    Analysis of towed decoys

    Kerins, W.J. | IEEE | 1993