|
Volumn , Issue , 2003, Pages 92-99
|
The use of Honeynets to detect exploited systems across large enterprise networks
a c a a b |
Author keywords
Bandwidth; Communication system traffic control; Computer crime; Computer hacking; Computer networks; Intrusion detection; IP networks; Operating systems; Protection; Telecommunication traffic
|
Indexed keywords
BANDWIDTH;
COMPUTER CONTROL SYSTEMS;
COMPUTER CRIME;
COMPUTER NETWORKS;
CYBERNETICS;
INTERNET;
INTRUSION DETECTION;
NETWORK SECURITY;
PERSONAL COMPUTING;
TELECOMMUNICATION TRAFFIC;
COMMUNICATION SYSTEM TRAFFIC;
COMPUTER HACKING;
ENTERPRISE NETWORKS;
IP NETWORKS;
PROTECTION;
SECURITY MECHANISM;
STORAGE CAPABILITY;
SYSTEM ADMINISTRATORS;
COMPUTER OPERATING SYSTEMS;
|
EID: 84946398426
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SMCSIA.2003.1232406 Document Type: Conference Paper |
Times cited : (89)
|
References (16)
|