Scalable framework for turn-key honeynet deployment

Enterprise networks present very high value targets in the eyes of malicious actors who seek to exfiltrate sensitive proprietary data, disrupt the operations of a particular organization, or leverage considerable computational and network resources to further their own illicit goals. For this reason...

Full description

Bibliographic Details
Main Author: Brzeczko, Albert Walter
Other Authors: Copeland, John A.
Format: Others
Language:en_US
Published: Georgia Institute of Technology 2014
Subjects:
Online Access:http://hdl.handle.net/1853/51842