Detecting and Analyzing Zero-Day Attacks Using Honeypots

Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detec...

Full description

Saved in:
Bibliographic Details
Published in:2013 19th International Conference on Control Systems and Computer Science pp. 543 - 548
Main Authors: Musca, Constantin, Mirica, Emma, Deaconescu, Razvan
Format: Conference Proceeding
Language:English
Published: IEEE 01.05.2013
Subjects:
ISBN:9781467361408, 1467361402
ISSN:2379-0474
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first