A quantitative experimental study of the effectiveness of systems to identify network attackers

<p> This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log tra...

Full description

Bibliographic Details
Main Author: Handorf, C. Russell
Language:EN
Published: Capella University 2017
Subjects:
Online Access:http://pqdtopen.proquest.com/#viewpdf?dispub=10252986