Specification of a Model of Honeypot Attack Based on Raised Data

Free registration required

Executive Summary

The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the project of gathering about twenty platforms was born. This paper aims to specify a model of honeypots attack. The model describes, on a given platform, the evolution of attacks according to theirs hours.

  • Format: PDF
  • Size: 422.7 KB