메뉴 건너뛰기




Volumn 2, Issue 6, 2004, Pages 73-75

Using honeynets to protect large enterprise networks

Author keywords

[No Author keywords available]

Indexed keywords

HONEYNET LOGS; INTERNET INFORMATION SERVER (IIS); INTRUSION-DETECTION SYSTEM (IDS); OFFLINE ANALYSIS;

EID: 10944236904     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.115     Document Type: Review
Times cited : (31)

References (4)
  • 1
  • 3
    • 10944237094 scopus 로고    scopus 로고
    • A methodology for detecting new binary rootkit exploits
    • IEEE Press
    • J. Levine, H. Owen, and B. Culver, "A Methodology for Detecting New Binary Rootkit Exploits," Proc. Southeast Conf., IEEE Press, 2003.
    • (2003) Proc. Southeast Conf.
    • Levine, J.1    Owen, H.2    Culver, B.3
  • 4
    • 4544282016 scopus 로고    scopus 로고
    • A methodology to characterize kernel-level rootkit exploits involving redirection of the system call table
    • IEEE Press
    • J. Levine, J. Grizzard, and H. Owen, "A Methodology to Characterize Kernel-Level Rootkit Exploits Involving Redirection of the System Call Table," Proc. 2nd Int'l Information Assurance Workshop, IEEE Press, 2004, pp. 107-125.
    • (2004) Proc. 2nd Int'l Information Assurance Workshop , pp. 107-125
    • Levine, J.1    Grizzard, J.2    Owen, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.