作者: David J. Plonka , Paul R. Barford , Vinod T. Yegneswaran
DOI:
关键词:
摘要: A monitor of malicious network traffic attaches to unused addresses and monitors communications with an active responder that has constrained-state awareness be highly scalable. In a preferred embodiment, the provides response based only on previous statement from source, which in most cases is sufficient promote additional communication presenting complete record transaction for analysis possible signature extraction.