DC ElementWertSprache
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorTrapp, Sebastian-
dc.contributor.authorKeil, Christian-
dc.contributor.authorSchönfelder, Jochen-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorSchiller, Jochen-
dc.date.accessioned2020-08-26T09:19:50Z-
dc.date.available2020-08-26T09:19:50Z-
dc.date.issued2012-
dc.identifier.isbn978-1-4503-1419-0en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/1869-
dc.description.abstractComputer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices. Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks.en
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery. Special Interest Group on Data Communicationen_US
dc.subjectMobile vs. non-mobile attacksen_US
dc.subjectmobile honeypoten_US
dc.subject.ddc004: Informatiken_US
dc.titleFirst insights from a mobile honeypoten
dc.typeinProceedingsen_US
dc.relation.conferenceACM SIGCOMM 2012en_US
dc.description.versionUnknownen_US
tuhh.container.endpage306en_US
tuhh.container.startpage305en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/2342356.2342422-
tuhh.publisher.urlhttp://conferences.sigcomm.org/sigcomm/2012/paper/sigcomm/p305.pdf-
tuhh.relation.ispartofseriesACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMMen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
tuhh.book.titleProceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication-
item.creatorGNDWählisch, Matthias-
item.creatorGNDTrapp, Sebastian-
item.creatorGNDKeil, Christian-
item.creatorGNDSchönfelder, Jochen-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDSchiller, Jochen-
item.fulltextNo Fulltext-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidTrapp, Sebastian-
item.creatorOrcidKeil, Christian-
item.creatorOrcidSchönfelder, Jochen-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidSchiller, Jochen-
item.seriesrefACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.tuhhseriesidACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

86
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.