메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 25-36

Defending cyberspace with fake honeypots

Author keywords

Deception; Defense; Honeypots; Intrusion detection systems; Signatures

Indexed keywords

NETWORK SECURITY;

EID: 70449122071     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.2.2.25-36     Document Type: Article
Times cited : (66)

References (31)
  • 3
    • 2342564023 scopus 로고    scopus 로고
    • The honeynet arms race
    • November/December
    • B. McCarty, "The honeynet arms race," IEEE Security and Privacy, 1(6), pp. 79-82, November/December 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.6 , pp. 79-82
    • McCarty, B.1
  • 5
    • 0002249231 scopus 로고    scopus 로고
    • London, UK: Cambridge University Press
    • P. Sztompka, Trust. London, UK: Cambridge University Press, 1999.
    • (1999) Trust
    • Sztompka, P.1
  • 6
    • 0033282572 scopus 로고    scopus 로고
    • A concept for strategic cyber defense
    • Atlantic City, NJ, October
    • W. Tirenin and D. Faatz, "A concept for strategic cyber defense," Proc. Conf. on Military Communications, Atlantic City, NJ, Vol. 1, pp. 458-463, October 1999.
    • (1999) Proc. Conf. On Military Communications , vol.1 , pp. 458-463
    • Tirenin, W.1    Faatz, D.2
  • 9
    • 84896280244 scopus 로고    scopus 로고
    • A Taxonomy of Deception In Cyberspace
    • International Conference on Information Warfare and Security, March
    • N. Rowe, "A taxonomy of deception in cyberspace," International Conference on Information Warfare and Security, Princess Anne, MD, pp. 173-181, March 2006.
    • (2006) Princess Anne, MD , pp. 173-181
    • Rowe, N.1
  • 10
    • 2342615538 scopus 로고    scopus 로고
    • Anti-honeypot technology
    • Jan.-Feb
    • N. Krawetz, "Anti-honeypot technology," IEEE Security and Privacy, 2(1), pp. 76-79, Jan.-Feb. 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1 , pp. 76-79
    • Krawetz, N.1
  • 13
    • 33745434223 scopus 로고    scopus 로고
    • Detecting honeypots and other suspicious environments
    • West Point, NY, June
    • T. Holz and F. Raynal, "Detecting honeypots and other suspicious environments," Proc. 6th SMC Information Assurance Workshop, West Point, NY, pp. 29-36, June 2005.
    • (2005) Proc. 6th SMC Information Assurance Workshop , pp. 29-36
    • Holz, T.1    Raynal, F.2
  • 20
    • 3843119704 scopus 로고
    • Cognitive factors in deception and counterdeception
    • ed. Daniel, D., & Herbig, K., New York: Pergamon
    • R. J. Heuer, "Cognitive factors in deception and counterdeception," in Strategic Military Deception, ed. Daniel, D., & Herbig, K., New York: Pergamon, 1982, pp. 31-69.
    • (1982) Strategic Military Deception , pp. 31-69
    • Heuer, R.J.1
  • 21
    • 10444223744 scopus 로고    scopus 로고
    • Toward Detecting Deception in Intelligent Systems
    • Orlando, Florida
    • E. Santos and G. Johnson, "Toward Detecting Deception in Intelligent Systems," Proc. SPIE Defense & Security Symposium, Vol. 5423, Orlando, Florida, 2004.
    • (2004) Proc. SPIE Defense & Security Symposium , vol.5423
    • Santos, E.1    Johnson, G.2
  • 22
    • 85138671305 scopus 로고    scopus 로고
    • Looking without seeing: Understanding unsophisticated consumers' success and failure to detect Internet deception
    • S. Grazioli and A. Wang, "Looking without seeing: understanding unsophisticated consumers' success and failure to detect Internet deception," Proc. 22nd Intl. Conf. on Information Systems, pp. 193-204, 2001.
    • (2001) Proc. 22nd Intl. Conf. On Information Systems , pp. 193-204
    • Grazioli, S.1    Wang, A.2
  • 25
    • 84871561513 scopus 로고    scopus 로고
    • An Arsenal of Deceptions For INFOSEC
    • Project Memorandum, National Defense Research Institute, PM-1167-NSA, October
    • S. Gerwehr, J. Rothenberg, and R. H. Anderson, "An arsenal of deceptions for INFOSEC," Project Memorandum, National Defense Research Institute, Rand Corp., PM-1167-NSA, October 1999.
    • (1999) Rand Corp
    • Gerwehr, S.1    Rothenberg, J.2    Anderson, R.H.3
  • 26
    • 33845944837 scopus 로고    scopus 로고
    • Identification of deliberately doctored text documents using frequent keyword chain (FKC) model
    • October
    • S. Kaza, S. Murthy, and G. Hu, "Identification of deliberately doctored text documents using frequent keyword chain (FKC) model," Proc. IEEE Intl. Conf. on Information Reuse and Integration, October 2003, pp. 398-405.
    • (2003) Proc. IEEE Intl. Conf. On Information Reuse and Integration , pp. 398-405
    • Kaza, S.1    Murthy, S.2    Hu, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.