Classifying malicious activities in Honeynets using entropy and volume-based thresholds

Sqalli, MH, Firdous, SN, Salah, K and Abu-Amara, M 2013, Classifying malicious activities in Honeynets using entropy and volume-based thresholds, SECURITY AND COMMUNICATION NETWORKS, vol. 6, no. 5, pp. 567-583, doi: 10.1002/sec.575.


Title Classifying malicious activities in Honeynets using entropy and volume-based thresholds
Author(s) Sqalli, MH
Firdous, SN
Salah, K
Abu-Amara, M
Journal name SECURITY AND COMMUNICATION NETWORKS
Volume number 6
Issue number 5
Start page 567
End page 583
Total pages 17
Publisher WILEY-HINDAWI
Publication date 2013-05-01
ISSN 1939-0114
1939-0122
Keyword(s) Science & Technology
Technology
Computer Science, Information Systems
Telecommunications
Computer Science
security
honeynet
malicious
entropy
classification
ANOMALY DETECTION
Language eng
DOI 10.1002/sec.575
Field of Research 0802 Computation Theory and Mathematics
0805 Distributed Computing
0899 Other Information and Computing Sciences

Document type: Journal Article
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 0 Abstract Views  -  Detailed Statistics
Created: Fri, 17 Jul 2020, 16:12:25 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.