메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 13-23

Using VMM-based sensors to monitor honeypots

Author keywords

Honeypot Monitoring; IDS; Intrusion Detection; Virtual Machine Monitor

Indexed keywords

COMPUTER OPERATING SYSTEMS; COSTS; DATA ACQUISITION; VIRTUAL REALITY;

EID: 33745946637     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1134760.1134765     Document Type: Conference Paper
Times cited : (39)

References (27)
  • 6
    • 84858907430 scopus 로고    scopus 로고
    • J. Dike. UML as a honeypot, 2005. http://user-mode-linux.sourceforge.net/ honeypots.html.
    • (2005) UML As A Honeypot
    • Dike, J.1
  • 11
    • 67651038840 scopus 로고    scopus 로고
    • A REAL NT rootkit
    • G. Hoglund. A REAL NT rootkit. Phrack Magazine, 9(55), 1999. http://www.phrack.org/phrack/55/P55-05.
    • (1999) Phrack Magazine , vol.9 , Issue.55
    • Hoglund, G.1
  • 13
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-based architecture for network attack detention center
    • Aug.
    • X. Jiang and D. Xu. Collapsar: A VM-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, pages 15-28, Aug. 2004.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 15-28
    • Jiang, X.1    Xu, D.2
  • 16
    • 33745935734 scopus 로고    scopus 로고
    • Dionaea: On the automatic collection of malicious code samples through honey pot farms
    • Invited talk at the
    • E. Levy. Dionaea: On the automatic collection of malicious code samples through honey pot farms, 2005. Invited talk at the GASCON 2005 Workshop on Cybersecurity.
    • (2005) GASCON 2005 Workshop on Cybersecurity
    • Levy, E.1
  • 17
    • 33745941729 scopus 로고    scopus 로고
    • Private conversation . Symantec Corp.
    • E. Levy. Private conversation, 2005. Symantec Corp.
    • (2005)
    • Levy, E.1
  • 18
    • 84858922653 scopus 로고    scopus 로고
    • LIDS Toolkit, 2005. http://www.lids.org.
    • (2005)
  • 20
    • 84858923855 scopus 로고    scopus 로고
    • Metasploit, 2005. http://www.metasploit.com.
    • (2005)
  • 24
    • 84858915840 scopus 로고    scopus 로고
    • Know your enemy: A forensic analysis
    • Honeynet Project, May
    • L. Spitzner. Know your enemy: A forensic analysis. Technical report, Honeynet Project, May 2000. http://www.honey-net.org/papers/forensics.
    • (2000) Technical Report
    • Spitzner, L.1
  • 25
    • 84858921768 scopus 로고    scopus 로고
    • The Honeynet Project, 2005. http://www.honeynet.org.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.