Cargando…

Ensuring network security through the use of the honeypot technique /

In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Selvaraj, Rajalakshmi (Autor), Madhav, Kuthadi Venu (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newcastle upon Tyne, UK : Cambridge Scholars Publishing, 2020
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1131785410
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 200225t20202020enka ob 000 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d N$T  |d OCLCF  |d UKMGB  |d OSU  |d UKAHL  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ 
015 |a GBC038223  |2 bnb 
015 |a GBC032524  |2 bnb 
016 7 |a 019649762  |2 Uk 
019 |a 1132423473 
020 |a 9781527544086  |q (electronic bk.) 
020 |a 1527544087  |q (electronic bk.) 
020 |z 9781527541436  |q (hardcover) 
020 |z 1527541436  |q (hardcover) 
029 1 |a UKMGB  |b 019649762 
035 |a (OCoLC)1131785410  |z (OCoLC)1132423473 
037 |a 9781527544086  |b Cambridge Scholars Publishing 
050 4 |a QA76.9.A25  |b S45 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Selvaraj, Rajalakshmi,  |e author. 
245 1 0 |a Ensuring network security through the use of the honeypot technique /  |c by Rajalakshmi Selvaraj and Kuthadi Venu Madhav 
264 1 |a Newcastle upon Tyne, UK :  |b Cambridge Scholars Publishing,  |c 2020 
264 4 |c ©2020 
300 |a 1 online resource (vii, 153 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references 
505 0 |a Introduction -- Literature review -- Motivation -- Honeypot technique for intrusion detection -- DDoS detection based on the ant technique using roaming virtual honeypots -- Enhanced intrusion detection system performance using Firecol Protection Services based honeypot system -- EIPDS: an effective technique to secure the network from intrusion -- An effective ODAIDS-HPS approach to preventing, detecting and responding to DDoS attacks -- Conclusions and future work 
588 0 |a Print version record 
520 |a In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Hacking  |x Prevention. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Madhav, Kuthadi Venu,  |e author. 
776 0 8 |i Print version:  |a Selvaraj, Rajalakshmi.  |t Ensuring network security through the use of the honeypot technique.  |d Newcastle upon Tyne, UK : Cambridge Scholars Publishing, 2020  |z 9781527541436  |w (OCoLC)1125997016 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2329693  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37104683 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5994500 
938 |a EBSCOhost  |b EBSC  |n 2329693 
938 |a YBP Library Services  |b YANK  |n 301009763 
994 |a 92  |b IZTAP