메뉴 건너뛰기




Volumn , Issue , 2004, Pages 9-14

An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION SYSTEM (IDS); MALICIOUS CODE; NETWORK TRAFFIC; TRAFFIC MONITORING;

EID: 15944365123     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 84860108005 scopus 로고    scopus 로고
    • Network Associates Technology, Inc. http://www.nai.com/us/security/home. asp.
  • 6
    • 3042581533 scopus 로고    scopus 로고
    • New York, NY: Addison-Wesley
    • Spitzner, Honeypots: Tracking Hackers. New York, NY: Addison-Wesley, 2003, pp. 58-64.
    • (2003) Honeypots: Tracking Hackers , pp. 58-64
    • Spitzner1
  • 7
    • 84860107186 scopus 로고    scopus 로고
    • The Honeynet Alliance. http://project.honeynet.org/challenge/results/ index.html.
  • 10
    • 3042581533 scopus 로고    scopus 로고
    • New York, NY: Addison-Wesley
    • Spitzner, Honeypots: Tracking Hackers. New York, NY: Addison-Wesley, 2003, pp. 65-68.
    • (2003) Honeypots: Tracking Hackers , pp. 65-68
    • Spitzner1
  • 12
    • 84860098857 scopus 로고    scopus 로고
    • January
    • T. Jackson, "Windows 2000 rootkit analysis." http://users.ece.gatech.edu/~owen/Research/HoneyNet/Quarterly/ Analysis_of_Windows_2000_root-kit.htm, January 2004.
    • (2004) Windows 2000 Rootkit Analysis
    • Jackson, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.