What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring.
Thomas FavaleDanilo GiordanoIdilio DragoMarco MelliaPublished in: EuroS&P Workshops (2022)
Keyphrases
- information security
- monitoring system
- forensic analysis
- network monitoring
- security requirements
- access control
- intrusion detection
- security issues
- security problems
- information assurance
- situational awareness
- wireless sensor
- security policies
- network security
- range images
- real time
- security level
- human operators
- functional requirements
- security management
- computer security
- data security
- security vulnerabilities
- neural network
- decision support
- range data
- statistical databases
- key management
- security mechanisms
- information flow
- network management