OLAP solutions: building multidimensional information systems
OLAP solutions: building multidimensional information systems
Anomaly-based intrusion detection: privacy concerns and other problems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Designing data marts for data warehouses
ACM Transactions on Software Engineering and Methodology (TOSEM)
Honeypots: Tracking Hackers
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
Honeypots for Distributed Denial of Service Attacks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Data Warehousing With Mysql
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
Design of a distributed computer security lab
Journal of Computing Sciences in Colleges
Multi-sensor agent-based intrusion detection system
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Hi-index | 0.01 |
As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. In this paper we discuss our experience in analyzing benefits of honeynets for intrusion detection. Using honeypots provides effective solution to increase the security; it is also useful tool for network forensic. Our purpose for this work is to examine how to integrate multiple intrusion detection sensors and honeynets in the order to minimize the number of incorrect-alarms. We present a framework for designing honeynets based project for network security analysis and an examples of the framework.