Abstract
This paper shows the usefulness of using simple honeypots to obtain data for a better understanding of some internet attack processes. The acquired knowledge can then be used to drive sound security design decisions in order to improve the ability of our systems to resist to attacks. Based on three years of collected data, we provide in this paper a critical review of geographical information provided by NetGeo, a study of the aftermath of the Deloder worm and a refined analysis of the interaction between machines devoted to scan and to attack. Copyright © 2008 Inderscience Enterprises Ltd.
Original language | English (US) |
---|---|
Pages (from-to) | 153-171 |
Number of pages | 19 |
Journal | International Journal of Critical Infrastructures |
Volume | 4 |
Issue number | 1-2 |
DOIs | |
State | Published - Jan 1 2008 |
Externally published | Yes |
Bibliographical note
Generated from Scopus record by KAUST IRTS on 2022-09-12ASJC Scopus subject areas
- General Environmental Science
- General Energy
- Safety, Risk, Reliability and Quality