메뉴 건너뛰기




Volumn , Issue , 2006, Pages 39-44

Lessons learned from the deployment of a high-interaction honeypot

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; INTERFACES (COMPUTER); INTRUSION DETECTION; PROBLEM SOLVING;

EID: 34547491379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EDCC.2006.17     Document Type: Conference Paper
Times cited : (71)

References (17)
  • 2
    • 84871424145 scopus 로고    scopus 로고
    • Home Page of the CAIDA Project
    • CAIDA Project
    • CAIDA Project. Home Page of the CAIDA Project, http://www.caida.org.
  • 3
    • 34547482492 scopus 로고    scopus 로고
    • Distributed Intrusion Detection System
    • http://www.dshield.org. Home page of the DShield.org Distributed Intrusion Detection System.
  • 6
    • 34547452754 scopus 로고    scopus 로고
    • Home page of Leurre.com: http://www.leurre.org.
    • Home page of Leurre.com: http://www.leurre.org.
  • 10
    • 34547409917 scopus 로고    scopus 로고
    • Lessons learned from the deployment of a high-interaction honeypot: Extended version
    • July
    • E. Alata, V. Nicomette, M. Kaaniche, M. Dacier, M. Herrb, Lessons learned from the deployment of a high-interaction honeypot: Extended version. LAAS Report, July 2006.
    • (2006) LAAS Report
    • Alata, E.1    Nicomette, V.2    Kaaniche, M.3    Dacier, M.4    Herrb, M.5
  • 11
    • 34547493317 scopus 로고    scopus 로고
    • Inc, Available on
    • Inc. VMware. Available on: http://www.vmware.com
    • VMware
  • 12
    • 34547454841 scopus 로고    scopus 로고
    • The PaX Team. Available on
    • The PaX Team. Available on: http://pax.grsecurity.net.
  • 13
    • 34547418697 scopus 로고    scopus 로고
    • EnergyMech team, Available on
    • EnergyMech team. Energymech. Available on: http://www.energymech.net.
    • Energymech
  • 16
    • 34547438799 scopus 로고    scopus 로고
    • J. Corey, Advanced honeypot identification and exploitation. Phrack, N 63, Available on: http://www.phrack.org/fakes/p63/p63-0x09.txt.
    • J. Corey, Advanced honeypot identification and exploitation. Phrack, N 63, Available on: http://www.phrack.org/fakes/p63/p63-0x09.txt.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.