Securing Containers: Honeypots for Analysing Container Attacks.
Yogesh C. JadhavArjun SableMaithri SureshManjesh K. HanawalPublished in: COMSNETS (2023)
Keyphrases
- detecting malicious
- network intrusion
- countermeasures
- information security
- forensic analysis
- intrusion detection
- terrorist attacks
- denial of service attacks
- security threats
- malicious users
- security protocols
- network intrusion detection
- neural network
- image watermarking
- malicious attacks
- computer security
- attack detection
- dos attacks
- database
- traffic analysis
- data publishing
- ddos attacks
- security vulnerabilities
- information systems