Turning the tables: Loadable Kernel Module Rootkits deployed in a honeypot environment
Honeypots are one of the latest technologies available to track and monitor hackers and Internet attackers. They can be generally divided into two different areas, production and research honeypots. Honeypots can also be classified by the amount of system interaction they provide to an attacker and...