Cyber Ranges: A design and implementation of Virtual Honeypots

作者: Haris Salam

DOI:

关键词:

摘要: Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement ...

参考文章(13)
Robert Stone, Dug Song, Rob Malan, A Snapshot of Global Internet Worm Activity ,(2001)
David Moore, Colleen Shannon, Geoffrey M Voelker, Stefan Savage, Network Telescopes: Technical Report ,(2004)
Xuxian Jiang, Dongyan Xu, Collapsar: a VM-based architecture for network attack detention center usenix security symposium. pp. 2- 2 ,(2004)
Vinod Yegneswaran, Paul Barford, Dave Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring recent advances in intrusion detection. pp. 146- 165 ,(2004) , 10.1007/978-3-540-30143-1_8
Geoffrey M. Voelker, Stefan Savage, David Moore, Inferring internet denial-of-service activity usenix security symposium. pp. 2- 2 ,(2001)
Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix Freiling, The Nepenthes Platform: An Efficient Approach to Collect Malware Lecture Notes in Computer Science. pp. 165- 184 ,(2006) , 10.1007/11856214_9
Robin G. Berthier, Michel Cukier, Advanced honeypot architecture for network threats quantification University of Maryland at College Park. ,(2009)
G. Chamales, The Honeywall CD-ROM ieee symposium on security and privacy. ,vol. 2, pp. 77- 79 ,(2004) , 10.1109/MSECP.2004.1281253
P. Papadimitratos, Secure ad hoc networking consumer communications and networking conference. ,vol. 1, pp. 10- 14 ,(2006) , 10.1109/CCNC.2006.1592978