Sciweavers

26 search results - page 1 / 6
» Monitoring unauthorized internet accesses through a 'honeypo...
Sort
View
IJCOMSYS
2011
39views more  IJCOMSYS 2011»
14 years 4 months ago
Monitoring unauthorized internet accesses through a 'honeypot' system
Mario Marchese, Roberto Surlinelli, Sandro Zappato...
RAID
2004
Springer
15 years 2 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
91
Voted
CAISE
2010
Springer
14 years 10 months ago
Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment
Abstract As service-based Internet systems get increasingly complex they become harder to manage at design time as well as at runtime. Nowadays, many systems are described in terms...
Ta'id Holmes, Uwe Zdun, Florian Daniel, Schahram D...
77
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
CASES
2005
ACM
14 years 11 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...