Lessons learned from the deployment of a high-interaction honeypotEric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb |
AbstractThis paper presents an experimental study and the lessons
learned from the observation of the attackers when logged on a
compromised machine. The results are based on a six months Keywords: high-interaction honeypot, computer security, attacks, attacker behavior |