This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of low-interaction honeypots. © 2006 IEEE.
|Original language||English (US)|
|Title of host publication||Proceedings - Sixth European Dependable Computing Conference, EDCC 2006|
|Number of pages||6|
|State||Published - Dec 1 2006|