메뉴 건너뛰기




Volumn 4, Issue 1-2, 2008, Pages 185-205

The HoneyTank: A scalable approach to collect malicious internet traffic

Author keywords

Honeypots; Intrusion detection systems; Worms

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER WORMS; INTERNET PROTOCOLS; INTRUSION DETECTION;

EID: 37848999037     PISSN: 14753219     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJCIS.2008.016100     Document Type: Article
Times cited : (4)

References (43)
  • 2
    • 0005018009 scopus 로고    scopus 로고
    • White Paper, Available from
    • Cisco (1999) NetFlow Services and Applications, White Paper, Available from http://www.cisco.com/warp/public/732/netflow.
    • (1999) NetFlow Services and Applications
    • Cisco1
  • 4
    • 26444592421 scopus 로고    scopus 로고
    • Attack processes found on the internet
    • Toulouse, April
    • Dacier, M., Pouget, F. and Debar, H. (2004b) 'Attack processes found on the internet', NATO Symposium IST-041/RSY-013, Toulouse, April, http://www.eurecom.fr/people/dacier.fr.htm.
    • (2004) NATO Symposium IST-041/RSY-013
    • Dacier, M.1    Pouget, F.2    Debar, H.3
  • 6
    • 37849044744 scopus 로고    scopus 로고
    • Freier, A, Karlton, P. and Kocher, P, 1996 TheSSL Protocol- Version 3.0, Internet Draft, Draft-Freier-ssl-Version3-02.txt, Work in Progress, November
    • Freier, A., Karlton, P. and Kocher, P. (1996) TheSSL Protocol- Version 3.0, Internet Draft, Draft-Freier-ssl-Version3-02.txt, Work in Progress, November.
  • 7
    • 37849049447 scopus 로고    scopus 로고
    • Life on a university network: An architecture for automatically detecting, isolating and cleaning infected hosts
    • February
    • Gauthier, E. (2004) 'Life on a university network: an architecture for automatically detecting, isolating and cleaning infected hosts', NANOG30, http://www.nanog.org/mtg-0402/gauthier.html, February.
    • (2004) NANOG30
    • Gauthier, E.1
  • 8
    • 84969573885 scopus 로고
    • ASAX: Software architecture and rule-based language for Universal audit trail analysis
    • Proceedings of the third European Symposium on Research in Security ESORICS'92, Springer-Verlag, November, Toulouse, pp
    • Habra, N., Le Charlier, B., Mounji, A. and Mathieu, I. (1992) 'ASAX: software architecture and rule-based language for Universal audit trail analysis', Proceedings of the third European Symposium on Research in Security (ESORICS'92), Lecture Notes in Computer Science, Springer-Verlag, November, Toulouse, pp.435-450.
    • (1992) Lecture Notes in Computer Science , pp. 435-450
    • Habra, N.1    Le Charlier, B.2    Mounji, A.3    Mathieu, I.4
  • 10
    • 37849033332 scopus 로고    scopus 로고
    • IPMON
    • IPMON (2004) Packet Trace Analysis, http://ipmon.sprint.com/ packstat/packetoverview.php.
    • (2004) Packet Trace Analysis
  • 14
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • November 20-21, Cambridge, MA USA, pp
    • Kreibich, C. and Crowcroft, J. (2003) 'Honeycomb - creating intrusion detection signatures using honeypots', 2nd Workshop on Hot Topics in Networks (HotNets-II), November 20-21, Cambridge, MA USA, pp.51-56.
    • (2003) 2nd Workshop on Hot Topics in Networks (HotNets-II) , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 15
    • 37848999526 scopus 로고    scopus 로고
    • Moore, D. (CAIDA) (2002) Network Telescopes: Observing Small Or Distant Security Events, http://www.caida.org/outreach/presentations/2002/ usenix_sec/, August.
    • Moore, D. (CAIDA) (2002) Network Telescopes: Observing Small Or Distant Security Events, http://www.caida.org/outreach/presentations/2002/ usenix_sec/, August.
  • 19
  • 22
    • 85084163190 scopus 로고    scopus 로고
    • A virtual honeypot framework
    • San Diego, CA, August
    • Provos, N. (2004) 'A virtual honeypot framework', 13th USENIX Security Symposium, San Diego, CA, August, http://www.citi.umich.edu/u/provos/ honeyd/.
    • (2004) 13th USENIX Security Symposium
    • Provos, N.1
  • 26
    • 37849020571 scopus 로고    scopus 로고
    • The Team Cymru , June
    • The Team Cymru (2004) The Team Cymru Darbtet Project, June, http://www.cymru.com/Darknet/index.html.
    • (2004) The Team Cymru Darbtet Project
  • 30
    • 14944341848 scopus 로고    scopus 로고
    • On the design and use of internet sinks for network abuse monitoring
    • Sophia Antipolis, France, September
    • Yegneswaran, V., Barford, P. and Plonka, D. (2004) 'On the design and use of internet sinks for network abuse monitoring', RAID 2004 Symposium, Sophia Antipolis, France, September.
    • (2004) RAID 2004 Symposium
    • Yegneswaran, V.1    Barford, P.2    Plonka, D.3
  • 39
    • 37849038157 scopus 로고    scopus 로고
    • Tcpdump-team
    • Tcpdump-team, TCPdump, http://www.tcpdump.org/.
    • TCPdump
  • 40
    • 37849053166 scopus 로고    scopus 로고
    • www.secdev.org/projects/scapy/.
  • 41
    • 37849005824 scopus 로고    scopus 로고
    • www.snort.org/.
  • 42
    • 37849011757 scopus 로고    scopus 로고
    • www.splintered.net/sw/flow-tools/docs/fiow-dscan.html.
  • 43
    • 37849041449 scopus 로고    scopus 로고
    • www.packetfactory.net/libnet/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.