Honeypot Log Analysis as a Network Security Support
The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information....
Main Authors: | Tri Widodo, Elvanisa Ayu Muhsina, Bambang Sugiantoro |
---|---|
Format: | Article |
Language: | English |
Published: |
State Islamic University Sunan Kalijaga
2013-05-01
|
Series: | IJID (International Journal on Informatics for Development) |
Subjects: | |
Online Access: | http://ejournal.uin-suka.ac.id/saintek/ijid/article/view/1492 |
Similar Items
-
Reducing Honeypot Log Storage Capacity Consumption – Cron Job with Perl-Script Approach
by: Iman Hazwam Bin Abd Halim, et al.
Published: (2019-11-01) -
Honeypots in network security
by: Akkaya, Deniz, et al.
Published: (2010) -
Análise de dados de bases de honeypots: estatística descritiva e regras de IDS
by: Ferreira, Pedro Henrique Matheus da Costa
Published: (2016) -
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
by: Yonas Kibret, et al.
Published: (2013-04-01) -
Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots
by: Watkins, Trevor U.
Published: (2009)