Detecting and Analyzing Zero-Day Attacks Using Honeypots
Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detec...
Saved in:
| Published in: | 2013 19th International Conference on Control Systems and Computer Science pp. 543 - 548 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.05.2013
|
| Subjects: | |
| ISBN: | 9781467361408, 1467361402 |
| ISSN: | 2379-0474 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!

