메뉴 건너뛰기




Volumn 4680 LNCS, Issue , 2007, Pages 197-208

Survival by deception

Author keywords

[No Author keywords available]

Indexed keywords

DATA HANDLING; SECURITY SYSTEMS; USER INTERFACES;

EID: 38149138082     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75101-4_19     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 4
    • 33750376598 scopus 로고    scopus 로고
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 165-184. Springer, Heidelberg (2006)
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
  • 5
    • 26444452602 scopus 로고    scopus 로고
    • A pointillist approach for comparing honeypots
    • Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
    • Pouget, F., Holz, T.: A pointillist approach for comparing honeypots. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 51-68. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 51-68
    • Pouget, F.1    Holz, T.2
  • 6
    • 38149010143 scopus 로고    scopus 로고
    • The HoneyNet Project, Online, Available
    • The HoneyNet Project. [Online]. Available: http://www.honeynet.org
  • 7
    • 0009016272 scopus 로고
    • An evening with Berferd in which a cracker is lured, endured, and studied
    • USENIX
    • Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: USENIX Conference Proceedings, pp. 163-174. USENIX (1992)
    • (1992) USENIX Conference Proceedings , pp. 163-174
    • Cheswick, B.1
  • 8
    • 0024011325 scopus 로고
    • Stalking the wily hacker
    • Stoll, C.: Stalking the wily hacker. Communications of the ACM 31(5), 484-497 (1988)
    • (1988) Communications of the ACM , vol.31 , Issue.5 , pp. 484-497
    • Stoll, C.1
  • 11
    • 38149003465 scopus 로고    scopus 로고
    • Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Sofware Engineering Institute (SEI), Carnegie Mellon University, Tech. Rep. CMU/SEI-97-TR-013 (1997-1999)
    • Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Sofware Engineering Institute (SEI), Carnegie Mellon University, Tech. Rep. CMU/SEI-97-TR-013 (1997-1999)
  • 13
    • 38149081913 scopus 로고    scopus 로고
    • Online, Available
    • Bait and Switch Honeypot.[Online]. Available: http://baitnswitch. sourceforge.net/
    • Bait and Switch Honeypot
  • 15
    • 33745673426 scopus 로고    scopus 로고
    • Detecting targeted attacks using shadow honeypots. ICS-FORTH, Crete, Greece
    • Tech. Rep. TR-348 January
    • Anagnostakis, K., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.: Detecting targeted attacks using shadow honeypots. ICS-FORTH, Crete, Greece, Tech. Rep. TR-348 (January 2005)
    • (2005)
    • Anagnostakis, K.1    Sidiroglou, S.2    Akritidis, P.3    Xinidis, K.4    Markatos, E.5    Keromytis, A.6
  • 16
    • 38149002713 scopus 로고    scopus 로고
    • Broen, T.: Innbruddstolerante systemer: En eksperimentell utprøving og vurdering. Master's thesis, University of Oslo, Norway (May 2005)
    • Broen, T.: Innbruddstolerante systemer: En eksperimentell utprøving og vurdering. Master's thesis, University of Oslo, Norway (May 2005)
  • 17
    • 77953729650 scopus 로고    scopus 로고
    • 1st edn. Addison-Wesley, Reading
    • Hoglund, G., Butler, J.: Rootkits, 1st edn. Addison-Wesley, Reading (2006)
    • (2006) Rootkits
    • Hoglund, G.1    Butler, J.2
  • 19
    • 0003907293 scopus 로고    scopus 로고
    • Macmillian Technical Publishing
    • Bace, R.G.: Intrusion Detection. Macmillian Technical Publishing (2000)
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 21
    • 0028446146 scopus 로고
    • Optimal-design of large software-systems using n-version programming
    • Ashrafi, N., Berman, O., Cutler, M.: Optimal-design of large software-systems using n-version programming. IEEE Transactions on Reliability 43(2), 344-350 (1994)
    • (1994) IEEE Transactions on Reliability , vol.43 , Issue.2 , pp. 344-350
    • Ashrafi, N.1    Berman, O.2    Cutler, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.