Design and Implementation of Linux Based Virtual HoneyClient

[1]  Ram Kumar Singh,et al.  Intrusion Detection System Using Advanced Honeypots , 2009, ArXiv.

[2]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .

[4]  Iyatiti Mokube,et al.  Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.

[5]  Ian Welch,et al.  Improving Detection Speed and Accuracy with Hybrid Client , 2006 .

[6]  E. Amoroso Intrusion Detection , 1999 .

[7]  T. Andrew Yang,et al.  DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * , 2005 .

[8]  William J. Buchanan,et al.  Software agents and computer network security , 2000, Proceedings Seventh IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS 2000).

[9]  Sze Li Harry Lim Assessing the Effect of Honeypots on Cyber-Attackers , 2006 .

[10]  Omer F. Rana,et al.  Honeyware: A Web-Based Low Interaction Client Honeypot , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.

[11]  Mario Guimaraes,et al.  Overview of intrusion detection and intrusion prevention , 2008, InfoSecCD2008 2008.

[12]  Nitin Gupta,et al.  A Survey on Mobile Agent based Intrusion Detection System , 2011 .

[13]  T. Verwoerd,et al.  Active network security , 1999 .

[14]  Hongli Zhang,et al.  Using Honeyclients to Detect Malicious Websites , 2010, 2010 2nd International Conference on E-business and Information System Security.

[15]  L. Leonardi,et al.  MOBILE AGENT TECHNOLOGY : CURRENT TRENDS AND PERSPECTIVES , 1998 .

[16]  Yang Wang,et al.  Collecting Internet Malware Based on Client-side Honeypot , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[17]  Ian Welch,et al.  HoneyC - The low-interaction client honeypot , 2006 .

[18]  Hongli Zhang,et al.  Client honeypots: Approaches and challenges , 2010, 4th International Conference on New Trends in Information Science and Service Science.

[19]  Zhiguang Qin,et al.  Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[20]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..