J Oberheide, M Karir,
ZM Mao - Detection of Intrusions and Malware, and …, 2007 - Springer
Security researchers and network operators increasingly rely on information gathered from
honeypots and sensors deployed on darknets, or unused address space, for attack …