Honeypot-based intrusion detection system: A performance analysis
暂无分享,去创建一个
[1] Binxing Fang,et al. An architecture for intrusion detection using honey pot , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[2] Yun Yang,et al. Design of distributed honeypot system based on intrusion tracking , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[3] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[4] Xiao Su,et al. J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] Yi-Lang Tsai,et al. Design of virtual honeynet collaboration system in existing security research networks , 2010, 2010 10th International Symposium on Communications and Information Technologies.
[6] Álvaro Herrero,et al. A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..
[7] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] Zhenyu Zhang,et al. The research and design of honeypot system applied in the LAN security , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.
[9] Hassan Artail,et al. A dynamic honeypot design for intrusion detection , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..
[10] Zhang Li-juan. Honeypot-based defense system research and design , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[11] LiXiaoyong,et al. An automatic scheme to construct Snort rules from honeypots data , 2005 .
[12] Jinjun Chen,et al. A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.
[13] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.