Sciweavers

24 search results - page 1 / 5
» A Honeypot Architecture for Detecting and Analyzing Unknown ...
Sort
View
KIVS
2005
Springer
13 years 10 months ago
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks
Patrick Diebold, Andreas Hess, Günter Sch&aum...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
13 years 11 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
DASC
2006
IEEE
13 years 11 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
WETICE
2007
IEEE
13 years 11 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
RAID
2004
Springer
13 years 10 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...