Honeypots: Tracking Hackers
A Comparison between Internal and External Malicious Traffic
ISSRE '07 Proceedings of the The 18th IEEE International Symposium on Software Reliability
Polymorphic Worm Detection Using Double-Honeynet
ICSEA '09 Proceedings of the 2009 Fourth International Conference on Software Engineering Advances
HoneySpam 2.0: Profiling Web Spambot Behaviour
PRIMA '09 Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems
Honeypot detection in advanced botnet attacks
International Journal of Information and Computer Security
Key Parameters in Identifying Cost of Spam 2.0
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Web Spambot Detection Based on Web Navigation Behaviour
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Storage cost of spam 2.0 in a web discussion forum
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Behaviour-Based web spambot detection by utilising action time and action frequency
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Factors involved in estimating cost of email spam
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
An empirical study of botnets on university networks using low-interaction honeypots
Proceedings of the 51st ACM Southeast Conference
Hi-index | 0.00 |
Firewall technology has been widely used for to improve network security. However, it can detect several- types of attacks, it has not been able to detect malicious traffic inside an organization. Due to this limitation of the firewall technology in improving network security, in this paper we discuss the honeypot technology focusing on malicious traffic inside an organization. We propose a model based on collaboration of the virtual honeyd, and virtual honeynets, with the addition of a different honeypots based IDS, to improve the design of the existing security architecture. We also show how our model (three-in-one) extends and improves the concept, compared to the existing approaches and designs.