DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Trapp, Sebastian | - |
dc.contributor.author | Keil, Christian | - |
dc.contributor.author | Schönfelder, Jochen | - |
dc.contributor.author | Schmidt, Thomas C. | - |
dc.contributor.author | Schiller, Jochen | - |
dc.date.accessioned | 2020-08-26T09:19:50Z | - |
dc.date.available | 2020-08-26T09:19:50Z | - |
dc.date.issued | 2012 | - |
dc.identifier.isbn | 978-1-4503-1419-0 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/1869 | - |
dc.description.abstract | Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices. Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks. | en |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery. Special Interest Group on Data Communication | en_US |
dc.subject | Mobile vs. non-mobile attacks | en_US |
dc.subject | mobile honeypot | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | First insights from a mobile honeypot | en |
dc.type | inProceedings | en_US |
dc.relation.conference | ACM SIGCOMM 2012 | en_US |
dc.description.version | Unknown | en_US |
tuhh.container.endpage | 306 | en_US |
tuhh.container.startpage | 305 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1145/2342356.2342422 | - |
tuhh.publisher.url | http://conferences.sigcomm.org/sigcomm/2012/paper/sigcomm/p305.pdf | - |
tuhh.relation.ispartofseries | ACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM | en_US |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.casrai | Conference Paper | - |
dc.type.dini | contributionToPeriodical | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
tuhh.book.title | Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication | - |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Trapp, Sebastian | - |
item.creatorGND | Keil, Christian | - |
item.creatorGND | Schönfelder, Jochen | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.creatorGND | Schiller, Jochen | - |
item.fulltext | No Fulltext | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Trapp, Sebastian | - |
item.creatorOrcid | Keil, Christian | - |
item.creatorOrcid | Schönfelder, Jochen | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.creatorOrcid | Schiller, Jochen | - |
item.seriesref | ACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.tuhhseriesid | ACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | inProceedings | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Appears in Collections: | Publications without full text |
Add Files to Item
Note about this record
Export
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.