메뉴 건너뛰기




Volumn 08-10-Sep-2015, Issue , 2015, Pages

A honeypot-driven cyber incident monitor: Lessons learned and steps ahead

Author keywords

Alert Correlation; Cyber Security; Honeypot; Incident Monitor

Indexed keywords

FREQUENCY HOPPING; SECURITY OF DATA;

EID: 84958601909     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2799979.2799999     Document Type: Conference Paper
Times cited : (18)

References (21)
  • 3
    • 83455219583 scopus 로고    scopus 로고
    • Securing collaborative intrusion detection systems
    • S. Cheung. Securing collaborative intrusion detection systems. IEEE Security and Privacy, 9(6):36-42, 2011.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.6 , pp. 36-42
    • Cheung, S.1
  • 5
    • 79960556588 scopus 로고    scopus 로고
    • Alert correlation in collaborative intelligent intrusion detection systems-A survey
    • Oct
    • H. T. Elshoush and I. M. Osman. Alert correlation in collaborative intelligent intrusion detection systems-A survey. Applied Soft Computing, 11(7):4349-4365, Oct. 2011.
    • (2011) Applied Soft Computing , vol.11 , Issue.7 , pp. 4349-4365
    • Elshoush, H.T.1    Osman, I.M.2
  • 6
    • 54849431370 scopus 로고    scopus 로고
    • OpenStreetMap: User-generated street maps. Pervasive computing
    • M. Haklay and P. Weber. OpenStreetMap: User-Generated Street Maps. Pervasive Computing. IEEE Pervasive Computing, 7(4):12-18, 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.4 , pp. 12-18
    • Haklay, M.1    Weber, P.2
  • 13
  • 14
    • 67349147317 scopus 로고    scopus 로고
    • Security against probe-response attacks in collaborative intrusion detection
    • New York, New York, USA, ACM
    • V. Shmatikov and M.-H. Wang. Security against probe-response attacks in collaborative intrusion detection. In Workshop on Large scale attack defense-LSAD, pages 129-136, New York, New York, USA, 2007. ACM.
    • (2007) Workshop on Large Scale Attack Defense-LSAD , pp. 129-136
    • Shmatikov, V.1    Wang, M.-H.2
  • 15
    • 84903529555 scopus 로고    scopus 로고
    • Study of internet threats and attack methods using honeypots and honeynets
    • Springer
    • T. Sochor and M. Zuzcak. Study of internet threats and attack methods using honeypots and honeynets. In Computer Networks, pages 118-127. Springer, 2014.
    • (2014) Computer Networks , pp. 118-127
    • Sochor, T.1    Zuzcak, M.2
  • 17
    • 78149255825 scopus 로고    scopus 로고
    • Node. Js: Using javascript to build high-performance network programs
    • S. Tilkov and S. Vinoski. Node. js: Using javascript to build high-performance network programs. IEEE Internet Computing, 14(6):0080-83, 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.6 , pp. 0080-83
    • Tilkov, S.1    Vinoski, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.