An entropy and volume-based approach for identifying malicious activities in honeynet traffic
Version 2 2024-06-05, 06:49Version 2 2024-06-05, 06:49
Version 1 2020-06-05, 15:59Version 1 2020-06-05, 15:59
conference contribution
posted on 2024-06-05, 06:49 authored by MH Sqalli, SN Firdous, Zubair BaigZubair Baig, F AzzedinAn entropy and volume-based approach for identifying malicious activities in honeynet traffic
History
Pagination
23-30Location
Banff, CANADAStart date
2011-10-04End date
2011-10-06ISBN-13
9780769544670Language
EnglishPublication classification
E1.1 Full written paper - refereedEditor/Contributor(s)
Gavrilova MLTitle of proceedings
Proceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011Event
International Conference on CyberworldsPublisher
IEEE COMPUTER SOCUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC