The IT Law Wiki

Low-interaction honeypot

32,080pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.[1]

References Edit

  1. The Fight Against the Threat from Botnets, at 11 n.1.

See also Edit

Also on Fandom

Random Wiki