Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Zombie

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Infected computers that can be used by a third party in order to carry out hostile actions against a victim. This use of the computer is made without the knowledge or authorization of the computer's real owner. Once infected, the computer becomes part of a botnet.
Published in Chapter:
Honeypots and Honeynets: Analysis and Case Study
José Manuel Fernández Marín (University of Almería, Spain), Juan Álvaro Muñoz Naranjo (University of Almería, Spain), and Leocadio González Casado (University of Almería, Spain)
DOI: 10.4018/978-1-4666-6324-4.ch029
Abstract
This chapter presents a review and a case of study of honeypots and honeynets. First, some of the most important and widely used honeypots in the current market are selected for comparative analysis, evaluating their interaction capacity with an attacker. Second, a self-contained honeynet architecture is implemented with virtual machines. An intrusion test is performed against the honeynet to observe the quality and quantity of the information collected during the attack. The final goal of this analysis is to assess the capacity of monitoring and threat detection of the honeynets and honeypots.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR