Comparative survey of local honeypot sensors to assist network forensics
暂无分享,去创建一个
Marc Dacier | Chi-Sung Laih | Fabien Pouget | Pei-Te Chen | C. Laih | M. Dacier | F. Pouget | Pei-Te Chen
[1] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[2] M. Dacier,et al. Honeypots : A Practical Mean to Validate Malicious Fault Assumptions Practical Experience Report , 2003 .
[3] Van-Hau Pham,et al. on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .
[4] Van-Hau Pham,et al. HONEYNETS: FOUNDATIONS FOR THE DEVELOPMENT OF EARLY WARNING INFORMATION SYSTEMS , 2005 .
[5] Eric Alata,et al. CADHo: Collection and Analysis of Data from Honeypots , 2005 .
[6] Thorsten Holz,et al. A Pointillist Approach for Comparing Honeypots , 2005, DIMVA.
[7] Robert Stone,et al. A Snapshot of Global Internet Worm Activity , 2001 .
[8] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[9] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.