The Honeynet Project: Trapping the Hackers
IEEE Security and Privacy
Honeycomb: creating intrusion detection signatures using honeypots
ACM SIGCOMM Computer Communication Review
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Security in sensor networks: watermarking techniques
Wireless sensor networks
Toward understanding distributed blackhole placement
Proceedings of the 2004 ACM workshop on Rapid malcode
Reflections on Industry Trends and Experimental Research in Dependability
IEEE Transactions on Dependable and Secure Computing
Design of network security projects using honeypots
Journal of Computing Sciences in Colleges
Playing the game: cheating, loopholes, and virtual identity
ACM SIGCAS Computers and Society
First year experiences of NSF REU grant: emerging issues in computer networking
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Honeypots: concepts, approaches, and challenges
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Data reduction for the scalable automated analysis of distributed darknet traffic
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Collapsar: a VM-based architecture for network attack detention center
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Detecting targeted attacks using shadow honeypots
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
IEEE Transactions on Dependable and Secure Computing
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
Building Reputations for Internet Clients
Electronic Notes in Theoretical Computer Science (ENTCS)
Honey@home: a new approach to large-scale threat monitoring
Proceedings of the 2007 ACM workshop on Recurring malcode
Data base support for intrusion detection with honeynets
TELE-INFO'07 Proceedings of the 6th WSEAS Int. Conference on Telecommunications and Informatics
Honeypot technologies and their applicability as a strategic internal countermeasure
International Journal of Information and Computer Security
Analyzing network and content characteristics of spim using honeypots
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
Detecting worm variants using machine learning
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Social Engineering Techniques, Risks, and Controls
The EDP Audit, Control, and Security Newsletter
Simulating cyber-attacks for fun and profit
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks
FAC '09 Proceedings of the 5th International Conference on Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience: Held as Part of HCI International 2009
Automatically patching errors in deployed software
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Self Adaptive High Interaction Honeypots Driven by Game Theory
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
The social honeypot project: protecting online communities from spammers
Proceedings of the 19th international conference on World wide web
The DecoyPort: redirecting hackers to honeypots
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Securing Bluetooth-based payment system using honeypot
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
PeekKernelFlows: peeking into IP flows
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
A view on current malware behaviors
LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Effective and efficient malware detection at the end host
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Clustering client honeypot data to support malware analysis
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
Honeypot in network security: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
A framework for cyber war against international terrorism
International Journal of Internet Technology and Secured Transactions
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
Journal in Computer Virology
A practical and light-weight data capture tool for Xen virtual machine
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
Digging into ip flow records with a visual kernel method
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Heliza: talking dirty to the attackers
Journal in Computer Virology
Proceedings of the 18th ACM conference on Computer and communications security
A Multi-dimensional Progressive Perfect Hashing for High-Speed String Matching
Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems
Estimating the relative trustworthiness of information sources in security solution evaluation
iTrust'06 Proceedings of the 4th international conference on Trust Management
An investigation of unauthorised use of wireless networks in adelaide, south australia
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Application of content computing in honeyfarm
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A pointillist approach for comparing honeypots
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Towards a cyber security reporting system – a quality improvement process
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
DarkNOC: dashboard for honeypot management
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
A security framework for blocking new types of internet worms in ubiquitous computing environments
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
ShadowNet: an active defense infrastructure for insider cyber attack prevention
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Improving network security and design using honeypots
Proceedings of the CUBE International Information Technology Conference
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
The proactivity of Perceptron derived algorithms in malware detection
Journal in Computer Virology
A malware collection and analysis framework based on darknet traffic
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part II
Is data clustering in adversarial settings secure?
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Hi-index | 0.00 |
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive SystemsHoneypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks. 0321108957B08282002