Abstract
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots. © 2006 IEEE.
Original language | English (US) |
---|---|
Title of host publication | Proceedings - Sixth European Dependable Computing Conference, EDCC 2006 |
Pages | 39-44 |
Number of pages | 6 |
DOIs | |
State | Published - Dec 1 2006 |
Externally published | Yes |