-
1
-
-
83255163267
-
Deception: A healthy part of any defense in-depth strategy
-
Whitepaper, SANS institute, [Online]. Available at
-
Anderson P., "Deception: A Healthy Part of Any Defense in-depth Strategy," Whitepaper, SANS institute, [Online]. Available at: http://www.sans.org/reading_room/whitepapers/policyissues, 2001.
-
(2001)
-
-
Anderson, P.1
-
2
-
-
34547361229
-
Honeyspam: Honeypots fighting spam at the source
-
USENIX
-
Andreolini M., Bulgarelli A., Colajanni M., and Mazzoni F., "Honeyspam: Honeypots Fighting Spam at the Source," in Proceedings of the International Workshop on Steps to Reducing Unwanted Traffic on the Internet, USENIX, pp. 77-83, 2005.
-
(2005)
Proceedings of the International Workshop On Steps to Reducing Unwanted Traffic On the Internet
, pp. 77-83
-
-
Andreolini, M.1
Bulgarelli, A.2
Colajanni, M.3
Mazzoni, F.4
-
3
-
-
67249089666
-
Comparison of empirical data from two honeynets and a distributed honeypot network
-
USA
-
Bloomfield R., Gashi I., Povyakalo A., and Stankovic V., "Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network," in Proceeding of 19th International Symposium on Software Reliability Engineering, USA, pp. 219-228, 2008.
-
(2008)
Proceeding of 19th International Symposium On Software Reliability Engineering
, pp. 219-228
-
-
Bloomfield, R.1
Gashi, I.2
Povyakalo, A.3
Stankovic, V.4
-
4
-
-
80052000675
-
Dynamic honeypot construction
-
University of Maryland, United States
-
Hecker C., Nance K., and Hay B., "Dynamic Honeypot Construction," in Proceedings of the 10th Colloquium for Information Systems Security Education, University of Maryland, United States, 2006.
-
(2006)
Proceedings of the 10th Colloquium For Information Systems Security Education
-
-
Hecker, C.1
Nance, K.2
Hay, B.3
-
5
-
-
33747012132
-
Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention
-
Jianga X., Xua D., and Wang Y., "Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention," Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 1165-1180, 2006.
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1165-1180
-
-
Jianga, X.1
Xua, D.2
Wang, Y.3
-
6
-
-
41149114663
-
Honeypots: Deployment and data forensic analysis
-
Maheswari V. and Sankaranarayanan, P., "Honeypots: Deployment and Data Forensic Analysis," in Proceeding of the International Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 129-131, 2007.
-
(2007)
Proceeding of the International Conference On Computational Intelligence and Multimedia Applications
, vol.4
, pp. 129-131
-
-
Maheswari, V.1
Sankaranarayanan, P.2
-
7
-
-
33749601284
-
Experiences with honeypot systems: Development, deployment, and analysis
-
McGrew R. and Vaughn R., "Experiences with Honeypot Systems: Development, Deployment, and Analysis," in Proceedings of the 39th Hawaii International Conference on System Sciences, vol. 9, pp. 220.1, 2006.
-
(2006)
Proceedings of the 39th Hawaii International Conference On System Sciences
, vol.9
, pp. 2201
-
-
McGrew, R.1
Vaughn, R.2
-
8
-
-
34248399630
-
Honeypots: Concepts, approaches and challenges
-
North Carolina, USA, ACM
-
Mokube I. and Adams M., "Honeypots: Concepts, Approaches and Challenges," in Proceedings of the 45th annual southeast regional conference, North Carolina, USA, ACM, pp. 321-326, 2007.
-
(2007)
Proceedings of the 45th Annual Southeast Regional Conference
, pp. 321-326
-
-
Mokube, I.1
Adams, M.2
-
9
-
-
48749131767
-
Detection of virtual environments and low interaction honeypots
-
New Mexico, IEEE
-
Mukkamala S., Yendrapalli K., Basnet R., Shankarapani K., and Sung, H., "Detection of Virtual Environments and Low Interaction Honeypots," Journal of Information Assurance and Security Workshop, IAW '07. IEEE SMC, New Mexico, IEEE, pp. 92-98, 2007.
-
(2007)
Journal of Information Assurance and Security Workshop, IAW '07. IEEE SMC
, pp. 92-98
-
-
Mukkamala, S.1
Yendrapalli, K.2
Basnet, R.3
Shankarapani, K.4
Sung, H.5
-
11
-
-
83255188431
-
A study of passwords and methods used in brute-force SSH attacks
-
Department of Computer Science Clarkson University, [Online]. Available at
-
Owens J. and Matthews J., "A Study of Passwords and Methods Used in Brute-Force SSH Attacks," Technical Report, Department of Computer Science Clarkson University, [Online]. Available at: http://people.clarkson.edu/~owensjp/pubs/leet08.pdf, 2008.
-
(2008)
Technical Report
-
-
Owens, J.1
Matthews, J.2
-
12
-
-
83255172392
-
Server honeypots vs. Client honeypot
-
The Honeynet Project, 2008, [Online]. Available at
-
Riden J., "Server Honeypots Vs. Client Honeypot," The Honeynet Project, 2008, [Online]. Available at: http://www.honeynet.org/ node/158, 2008.
-
(2008)
-
-
Riden, J.1
-
13
-
-
33745454337
-
An e-mail honeypot addressing spammers' behavior in collecting and applying addresses
-
United States Military Academy, West Point, NY
-
Schryen G., "An e-mail honeypot addressing spammers' behavior in collecting and applying addresses," in Proceedings of the 6th Annual IEEE for Information Assurance Workshop, IAW'05, United States Military Academy, West Point, NY, 2005.
-
(2005)
Proceedings of the 6th Annual IEEE For Information Assurance Workshop, IAW'05
-
-
Schryen, G.1
-
14
-
-
2942675805
-
Honeypots: Definitions and value of honeypots
-
Honeynet Project, [Online]. Available at
-
Spitzner L., "Honeypots: Definitions and Value of Honeypots," Honeynet Project, [Online]. Available at: http://www.trackinghackers.com/papers/honeypots.html, 2003.
-
(2003)
-
-
Spitzner, L.1
-
15
-
-
38149123930
-
Honeypots: Simple, cost effective solution
-
[Online] available at
-
Spitzner, L., "Honeypots: Simple, Cost Effective Solution," [Online] available at: http://www.securityfocus.com/infocus/1690, 2003.
-
-
-
Spitzner, L.1
-
16
-
-
58349112755
-
Collecting internet malware based on client-side honeypot
-
Hunan, China
-
Sun X., Wang Y., Ren J., Zhu Y., and Liu S., "Collecting Internet Malware Based on Client-Side Honeypot," The 9th International Conference for Young Computer Scientists, ICYCS, Hunan, China, pp. 1493-1498, 2008.
-
(2008)
The 9th International Conference For Young Computer Scientists, ICYCS
, pp. 1493-1498
-
-
Sun, X.1
Wang, Y.2
Ren, J.3
Zhu, Y.4
Liu, S.5
-
17
-
-
33846625241
-
Honeynets: A tool for counterintelligence in online security
-
Watson D., "Honeynets: a tool for counterintelligence in online security," Journal of Network Security, vol. 2007, no. 1, pp. 4-8, 2007.
-
(2007)
Journal of Network Security
, vol.2007
, Issue.1
, pp. 4-8
-
-
Watson, D.1
-
18
-
-
83255163262
-
Intelligent multi-agent based multivariate statistical framework for database intrusion prevention system
-
July
-
Ramasubramaniam P. and Kannan A., "Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System," The International Arab Journal of Information Technology, vol. 2, no.3, pp. 239-247, July 2005.
-
(2005)
The International Arab Journal of Information Technology
, vol.2
, Issue.3
, pp. 239-247
-
-
Ramasubramaniam, P.1
Kannan, A.2
|