메뉴 건너뛰기




Volumn , Issue , 2005, Pages 129-144

Detecting targeted attacks using shadow honeypots

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; NETWORK ARCHITECTURE; NETWORK SECURITY; WEB BROWSERS;

EID: 59249106693     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (138)

References (59)
  • 1
    • 85077534085 scopus 로고    scopus 로고
    • i-Bench. http://http://www.veritest.com/ benchmarks/i- bench/default.asp
    • i-Bench. http://http://www.veritest.com/ benchmarks/i- bench/default.asp.
  • 2
    • 85077525615 scopus 로고    scopus 로고
    • Using network-based application recognition and access control lists for blocking thecode red
    • Technical report, Cisco Systems, Inc
    • Using Network-Based Application Recognition and Access Control Lists for Blocking the”Code Red” Worm at Network Ingress Points. Technical report, Cisco Systems, Inc.
    • Worm at Network Ingress Points
  • 14
    • 0042078549 scopus 로고    scopus 로고
    • A survey of rollback-recovery protocols in message-passing systems
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv., 34(3):375–408, 2002.
    • (2002) ACM Comput. Surv. , vol.34 , Issue.3 , pp. 375-408
    • Elnozahy, E.N.1    Alvisi, L.2    Wang, Y.-M.3    Johnson, D.B.4
  • 20
    • 10944236904 scopus 로고    scopus 로고
    • Using honeynets to protect large enterprise networks
    • November/December
    • J. G. Levine, J. B. Grizzard, and H. L. Owen. Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy, 2(6):73–75, November/December 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.6 , pp. 73-75
    • Levine, J.G.1    Grizzard, J.B.2    Owen, H.L.3
  • 21
    • 0034479192 scopus 로고    scopus 로고
    • Secure execution of java applets using a remote playground
    • D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Trans. Softw. Eng., 26(12):1197–1209, 2000.
    • (2000) IEEE Trans. Softw. Eng. , vol.26 , Issue.12 , pp. 1197-1209
    • Malkhi, D.1    Reiter, M.K.2
  • 22
    • 0027631586 scopus 로고
    • The denotational semantics of a functional tree-manipulation language
    • A. J. Malton. The Denotational Semantics of a Functional Tree-Manipulation Language. Computer Languages, 19(3):157–168, 1993.
    • (1993) Computer Languages , vol.19 , Issue.3 , pp. 157-168
    • Malton, A.J.1
  • 26
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overflows
    • July/August
    • J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overflows. IEEE Security & Privacy, 2(4):20–27, July/August 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 32
    • 85090433665 scopus 로고    scopus 로고
    • SNORT: Lightweight intrusion detection for networks
    • November software
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA, November 1999. (software available from http://www.snort.org/).
    • (1999) Proceedings of USENIX LISA
    • Roesch, M.1
  • 39
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is NP-complete
    • January
    • D. Spinellis. Reliable identification of bounded-length viruses is NP-complete. IEEE Transactions on Information Theory, 49(1):280–284, January 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1
  • 41
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • to appear
    • S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, 2005. (to appear).
    • (2005) Journal of Computer Security
    • Staniford, S.1
  • 44
    • 33845428560 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGOPS Operating Systems Review, 38(5):85–96, 2004.
    • (2004) SIGOPS Operating Systems Review , vol.38 , Issue.5 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 52
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • August
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM Conference, pages 193–204, August 2004.
    • (2004) Proceedings of the ACM SIGCOMM Conference , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.