메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages

Improving exposure of intrusion deception system through implementation of hybrid honeypot

Author keywords

Client honeypot; Hybrid honeypot; IDS; Server honeypot

Indexed keywords


EID: 83255188847     PISSN: 16833198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (17)

References (18)
  • 1
    • 83255163267 scopus 로고    scopus 로고
    • Deception: A healthy part of any defense in-depth strategy
    • Whitepaper, SANS institute, [Online]. Available at
    • Anderson P., "Deception: A Healthy Part of Any Defense in-depth Strategy," Whitepaper, SANS institute, [Online]. Available at: http://www.sans.org/reading_room/whitepapers/policyissues, 2001.
    • (2001)
    • Anderson, P.1
  • 5
    • 33747012132 scopus 로고    scopus 로고
    • Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention
    • Jianga X., Xua D., and Wang Y., "Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention," Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 1165-1180, 2006.
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1165-1180
    • Jianga, X.1    Xua, D.2    Wang, Y.3
  • 11
    • 83255188431 scopus 로고    scopus 로고
    • A study of passwords and methods used in brute-force SSH attacks
    • Department of Computer Science Clarkson University, [Online]. Available at
    • Owens J. and Matthews J., "A Study of Passwords and Methods Used in Brute-Force SSH Attacks," Technical Report, Department of Computer Science Clarkson University, [Online]. Available at: http://people.clarkson.edu/~owensjp/pubs/leet08.pdf, 2008.
    • (2008) Technical Report
    • Owens, J.1    Matthews, J.2
  • 12
    • 83255172392 scopus 로고    scopus 로고
    • Server honeypots vs. Client honeypot
    • The Honeynet Project, 2008, [Online]. Available at
    • Riden J., "Server Honeypots Vs. Client Honeypot," The Honeynet Project, 2008, [Online]. Available at: http://www.honeynet.org/ node/158, 2008.
    • (2008)
    • Riden, J.1
  • 13
    • 33745454337 scopus 로고    scopus 로고
    • An e-mail honeypot addressing spammers' behavior in collecting and applying addresses
    • United States Military Academy, West Point, NY
    • Schryen G., "An e-mail honeypot addressing spammers' behavior in collecting and applying addresses," in Proceedings of the 6th Annual IEEE for Information Assurance Workshop, IAW'05, United States Military Academy, West Point, NY, 2005.
    • (2005) Proceedings of the 6th Annual IEEE For Information Assurance Workshop, IAW'05
    • Schryen, G.1
  • 14
    • 2942675805 scopus 로고    scopus 로고
    • Honeypots: Definitions and value of honeypots
    • Honeynet Project, [Online]. Available at
    • Spitzner L., "Honeypots: Definitions and Value of Honeypots," Honeynet Project, [Online]. Available at: http://www.trackinghackers.com/papers/honeypots.html, 2003.
    • (2003)
    • Spitzner, L.1
  • 15
    • 38149123930 scopus 로고    scopus 로고
    • Honeypots: Simple, cost effective solution
    • [Online] available at
    • Spitzner, L., "Honeypots: Simple, Cost Effective Solution," [Online] available at: http://www.securityfocus.com/infocus/1690, 2003.
    • Spitzner, L.1
  • 17
    • 33846625241 scopus 로고    scopus 로고
    • Honeynets: A tool for counterintelligence in online security
    • Watson D., "Honeynets: a tool for counterintelligence in online security," Journal of Network Security, vol. 2007, no. 1, pp. 4-8, 2007.
    • (2007) Journal of Network Security , vol.2007 , Issue.1 , pp. 4-8
    • Watson, D.1
  • 18
    • 83255163262 scopus 로고    scopus 로고
    • Intelligent multi-agent based multivariate statistical framework for database intrusion prevention system
    • July
    • Ramasubramaniam P. and Kannan A., "Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System," The International Arab Journal of Information Technology, vol. 2, no.3, pp. 239-247, July 2005.
    • (2005) The International Arab Journal of Information Technology , vol.2 , Issue.3 , pp. 239-247
    • Ramasubramaniam, P.1    Kannan, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.