The bilateral communication-based dynamic extensible honeypot
暂无分享,去创建一个
[1] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[2] Adel Bouhoula,et al. Honeypot router for routing protocols protection , 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009).
[3] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[4] Sotiris Ioannidis,et al. HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing , 2009, 2009 Third International Conference on Network and System Security.
[5] Tao Zhang,et al. Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[6] Evangelos P. Markatos,et al. Emulation-Based Detection of Non-self-contained Polymorphic Shellcode , 2007, RAID.
[7] Zhang Jian,et al. Exploration on the Connotation of Management Honeypot , 2010, ICEE 2010.
[8] Lei Wu,et al. Honeypot detection in advanced botnet attacks , 2010, Int. J. Inf. Comput. Secur..
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[10] Tzi-cker Chiueh,et al. Scalable network-based buffer overflow attack detection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[11] Vasaka Visoottiviseth,et al. Distributed Honeypot log management and visualization of attacker geographical distribution , 2011, 2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE).
[12] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] Ryan Cunningham,et al. Honeypot-Aware Advanced Botnet Construction and Maintenance , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[14] Evangelos P. Markatos,et al. STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis , 2005, SEC.
[15] Ruby B. Lee,et al. A processor architecture defense against buffer overflow attacks , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[16] Liang Hongxia,et al. Notice of RetractionOn the incentives of management honeypot , 2011, 2011 International Conference on Business Management and Electronic Information.
[17] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[18] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[19] Neal Krawetz,et al. Anti-honeypot technology , 2004, IEEE Security & Privacy Magazine.
[20] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[21] Jian Zhang,et al. Exploration on the Connotation of Management Honeypot , 2010, 2010 International Conference on E-Business and E-Government.
[22] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.