Login / Signup
Detecting Targeted Attacks Using Shadow Honeypots.
Kostas G. Anagnostakis
Stelios Sidiroglou
Periklis Akritidis
Konstantinos Xinidis
Evangelos P. Markatos
Angelos D. Keromytis
Published in:
USENIX Security Symposium (2005)
Keyphrases
</>
detecting malicious
network intrusion detection systems
network intrusion
detect malicious
intrusion detection system
network intrusion detection
security threats
intrusion detection
malicious attacks
end hosts
data sets
web pages
edge detection
automatic detection
forensic analysis