Return to Article Details Using traps to protect network infrastructure from intruders’ attacks Download Download PDF