DShield honeypots [1] receive different types of attack traffic and the volume of that traffic can change over time. I've been collecting data from a half dozen honeypots for a little over a year to make comparisons. This data includes:
http://news.poseidon-us.com/TL3gsNLike this:
Like Loading...
Related