Please use this identifier to cite or link to this item: https://ptsldigital.ukm.my/jspui/handle/123456789/395343
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWira Zanoramy Ansiry Zakaria-
dc.contributor.authorSiti Rohaidah Ahmad-
dc.contributor.authorNorazah Abd Aziz-
dc.date.accessioned2023-06-15T07:59:03Z-
dc.date.available2023-06-15T07:59:03Z-
dc.identifier.otherukmvital:125571-
dc.identifier.urihttps://ptsldigital.ukm.my/jspui/handle/123456789/395343-
dc.description.abstractXen is a virtual machine monitor that supports execution of multiple guest operating systems on the same computer hardware at the same time with unprecedented levels of performance and resource isolation. Honeypot is a decoy system, deployed throughout the network, which purposely built to attract and deceive computer intruders and malicious programs. In this paper, we review the combination of both, virtualization technologies of Xen and honeypot concept, in order to deploy and run virtual honeypot on top of virtual machine monitor.-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE),Piscataway, US-
dc.subjectHoneypots-
dc.subjectXen-
dc.subjectVirtual machine monitor-
dc.titleDeploying virtual honeypots on virtual machine monitor-
dc.typeSeminar Papers-
dc.format.pages5-
dc.identifier.callnoT58.5.C634 2008 kat sem j.4-
dc.contributor.conferencenameInternational Symposium on Information Technology-
dc.coverage.conferencelocationKuala Lumpur Convention Centre-
dc.date.conferencedate26/08/2008-
Appears in Collections:Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.