Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/395343
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wira Zanoramy Ansiry Zakaria | - |
dc.contributor.author | Siti Rohaidah Ahmad | - |
dc.contributor.author | Norazah Abd Aziz | - |
dc.date.accessioned | 2023-06-15T07:59:03Z | - |
dc.date.available | 2023-06-15T07:59:03Z | - |
dc.identifier.other | ukmvital:125571 | - |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/395343 | - |
dc.description.abstract | Xen is a virtual machine monitor that supports execution of multiple guest operating systems on the same computer hardware at the same time with unprecedented levels of performance and resource isolation. Honeypot is a decoy system, deployed throughout the network, which purposely built to attract and deceive computer intruders and malicious programs. In this paper, we review the combination of both, virtualization technologies of Xen and honeypot concept, in order to deploy and run virtual honeypot on top of virtual machine monitor. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US | - |
dc.subject | Honeypots | - |
dc.subject | Xen | - |
dc.subject | Virtual machine monitor | - |
dc.title | Deploying virtual honeypots on virtual machine monitor | - |
dc.type | Seminar Papers | - |
dc.format.pages | 5 | - |
dc.identifier.callno | T58.5.C634 2008 kat sem j.4 | - |
dc.contributor.conferencename | International Symposium on Information Technology | - |
dc.coverage.conferencelocation | Kuala Lumpur Convention Centre | - |
dc.date.conferencedate | 26/08/2008 | - |
Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.