메뉴 건너뛰기




Volumn , Issue , 2004, Pages 383-388

Honeypots: Practical means to validate malicious fault assumptions

Author keywords

[No Author keywords available]

Indexed keywords

DEPENDABILITY; HONEYPOTS; INTRUSION TOLERANT SYSTEMS; NIMDA;

EID: 2642562805     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2004.1276594     Document Type: Conference Paper
Times cited : (29)

References (34)
  • 2
    • 2642587641 scopus 로고    scopus 로고
    • ICMP usage in scanning - The complete know-how
    • June
    • O. Arkin, "ICMP Usage in Scanning - The complete Know-How", The Sys-Security Group. Version 3.0. June 2001. (www.sys-security.com)
    • (2001) The Sys-Security Group. Version 3.0
    • Arkin, O.1
  • 4
    • 0009060610 scopus 로고
    • Packets found on an internet
    • July
    • S. M. Bellovin, "Packets Found on an Internet", Computer Communications Review 23:3, pp. 26-31, July 1993.
    • (1993) Computer Communications Review , vol.23 , Issue.3 , pp. 26-31
    • Bellovin, S.M.1
  • 5
    • 2642550188 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis, home page: www.caida.org
  • 6
    • 2642572091 scopus 로고    scopus 로고
    • (previously known as TASK), Brian Carrier
    • The sleuth kit V1.62 (previously known as TASK), Brian Carrier, 2003, www.sleuthkit.org/
    • (2003) The Sleuth Kit V1.62
  • 7
    • 0009016272 scopus 로고
    • An evening with Berferd in which a cracker is lured, endured and studied
    • San Francisco, Jan 20
    • B. Cheswick, "An evening with Berferd in which a cracker is lured, endured and studied", Proc Winter USENIX Conference, San Francisco, Jan 20, 1992.
    • (1992) Proc Winter USENIX Conference
    • Cheswick, B.1
  • 10
    • 2642587640 scopus 로고    scopus 로고
    • Observations on the Internet traffic reaching broadband-connected users
    • Copenhagen, Mai
    • H. Debar and D. Lefranc, "Observations on the Internet traffic reaching broadband-connected users", EICAR Conference, Copenhagen, Mai 2003.
    • (2003) EICAR Conference
    • Debar, H.1    Lefranc, D.2
  • 14
    • 2642516102 scopus 로고    scopus 로고
    • Internship Report from IBM Zurich for the Eurecom Institute, June, ref. Eurecom: CE-98/IBM/GRUN - Document number: 1914
    • Stéphane Grundschober, "Sniffer Detector Report", Internship Report from IBM Zurich for the Eurecom Institute, June 1998, 50 pages, ref. Eurecom: CE-98/IBM/GRUN - Document number: 1914. Available on line: http://www.eurecom.fr/~nsteam/Papers/grundschober98.ps
    • (1998) Sniffer Detector Report
    • Grundschober, S.1
  • 16
    • 2642578623 scopus 로고    scopus 로고
    • Irish Honeynet Alliance members. Collected data available on line: www.honeynet.ie/results.htm
  • 17
    • 84885888847 scopus 로고    scopus 로고
    • FAQ
    • Honeypot mailing list, FAQ; www.securityfocus.com/popups/forums/ honeypots/faq.shtml
    • Honeypot Mailing List
  • 24
    • 2642585140 scopus 로고    scopus 로고
    • Netgeo Utility, available online at http://netgeo.caida.org/perl/netgeo. cgi
    • Netgeo Utility
  • 27
    • 84882572974 scopus 로고    scopus 로고
    • Niels Provos
    • Honeyd Home page, Niels Provos, http://www.citi.umich.edu/u/provos/ honeyd/
    • Honeyd Home Page
  • 28
    • 2642532234 scopus 로고
    • Stalking the wiley hacker
    • May
    • C. Stoll, "Stalking the Wiley Hacker", Communications of the ACM, Vol. 31 No 5. May 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.5
    • Stoll, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.