Decoy application servers

作者: Mark Cameron Little

DOI:

关键词: Database connectivityClient–server modelOperating systemLog shippingApplication serverComputer scienceJavaDecoy

摘要: A computing device, executing a decoy application server that does not have access to real data, receives service request from client. The protects designated server, wherein the and include instances of single Java program. establishes connection false database via Database Connectivity (JDBC) driver. retrieves data database, provides

参考文章(11)
Kouji Nakao, Keisuke Takemori, Toshiaki Tanaka, Intrusion preventing system ,(2001)
Shinobu Ushirozawa, Akiko Miyagawa, Toru Inada, Illegal access data handling apparatus and method for handling illegal access data ,(2001)
David J. Plonka, Paul R. Barford, Vinod T. Yegneswaran, Scalable monitor of malicious network traffic ,(2005)
Angelos D. Keromytis, Vasileios P. Kemerlis, Shlomo Hershkop, Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem, Pratap V. Prabhu, Methods, systems, and media for baiting inside attackers ,(2009)
Ronald O' Neal Edmark, John Michael Garrison, Vikki Kim Converse, Kenneth W. Blake, Method and system for morphing honeypot with computer security incident correlation ,(2008)
Prasanth Alla, Frank N. Adelstein, Haim Bar, Nikita Proskourine, Attack correlation using marked information ,(2005)
Masaya Yamagata, Masayuki Nakae, Attack defending system and attack defending method ,(2003)