메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 29-36

Detecting honeypots and other suspicious environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SIMULATION; CYBERNETICS; INFORMATION TECHNOLOGY; PATTERN RECOGNITION; PROGRAM DEBUGGING; SECURITY SYSTEMS;

EID: 33745434223     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495930     Document Type: Conference Paper
Times cited : (140)

References (24)
  • 2
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • G. J. Simmons, "The prisoners' problem and the subliminal channel," in Advances in Cryptology, pp. 51-67, 1984.
    • (1984) Advances in Cryptology , pp. 51-67
    • Simmons, G.J.1
  • 5
    • 33745476292 scopus 로고    scopus 로고
    • Internet
    • "Sebek." Internet: http://honeynet.org/papers/honeynet/tools/ sebek/, 2004.
    • (2004) Sebek
  • 6
    • 24144435430 scopus 로고    scopus 로고
    • November
    • The Honeynet Project, "Know your Enemy; Sebek," November 2003. http://www.honeynet.org/papers/sebek.pdf.
    • (2003) Know Your Enemy; Sebek
  • 8
    • 33745450589 scopus 로고    scopus 로고
    • http://www.security.org.sg/vuln/sebek215-2.html
    • T. C. Keong, "Detecting sebek Win32 client." http://www.security.org.sg/vuln/sebek215.html and http://www.security.org.sg/ vuln/sebek215-2.html.
    • Detecting Sebek Win32 Client
    • Keong, T.C.1
  • 10
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel pentium's ability to support a secure virtual machine monitor
    • J. S. Robin and C. E. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in Proceedings of 9th USENIX Security Symposium, 2000.
    • (2000) Proceedings of 9th USENIX Security Symposium
    • Robin, J.S.1    Irvine, C.E.2
  • 13
    • 33745435860 scopus 로고    scopus 로고
    • "Honeypot proofs." http://user-mode-linux.sourceforge.net/ hppfs.html.
    • Honeypot Proofs
  • 15
    • 33745440626 scopus 로고    scopus 로고
    • Internet
    • "Vmware homepage," Internet: http://www.vmware.com/.
    • Vmware Homepage
  • 18
    • 4444219556 scopus 로고    scopus 로고
    • Internet
    • "Ieee standards." Internet: http://standards.ieee.org/regauth/ oui/oui.txt.
    • Ieee Standards
  • 19
    • 78651476429 scopus 로고    scopus 로고
    • Internet
    • "Vmware backdoor i/o port." Internet: http://chitchat.at. infoseek.co.jp/vmware/backdoor.html.
    • Vmware Backdoor I/o Port
  • 23
    • 84882752836 scopus 로고    scopus 로고
    • Mesure locale des temps d'exécution: Application au contrôle d'intégrité et au fingerprinting
    • G. Delalleau, "Mesure locale des temps d'exécution: application au contrôle d'intégrité et au fingerprinting." SSTIC 2004: http://actes.sstic.org/SSTIC04/ Fingerprinting_integrite_par_timing/.
    • SSTIC 2004
    • Delalleau, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.