Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.
Attributes | Values |
---|
rdfs:label
| |
rdfs:comment
| - Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.
|
dcterms:subject
| |
abstract
| - Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.
|