Sciweavers

24 search results - page 1 / 5
» A Honeypot Architecture for Detecting and Analyzing Unknown ...
Sort
View
18
Voted
KIVS
2005
Springer
14 years 18 days ago
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks
Patrick Diebold, Andreas Hess, Günter Sch&aum...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 1 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
WETICE
2007
IEEE
14 years 1 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
RAID
2004
Springer
14 years 14 days ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...