Empirical studies based on honeypots for characterizing attackers behavior

The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is discovered, it is difficult to identify the actions performed by an attacker. In this study, we explore the compromise phase, i.e., when an attac...

Full description

Saved in:
Bibliographic Details
Main Author: Sobesto, Bertrand
Format: Dissertation
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first