Design and Implementation of Linux Based Virtual HoneyClient
暂无分享,去创建一个
[1] Ram Kumar Singh,et al. Intrusion Detection System Using Advanced Honeypots , 2009, ArXiv.
[2] Wayne Jansen,et al. Applying Mobile Agents to Intrusion Detection and Response , 1999 .
[4] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[5] Ian Welch,et al. Improving Detection Speed and Accuracy with Hybrid Client , 2006 .
[6] E. Amoroso. Intrusion Detection , 1999 .
[7] T. Andrew Yang,et al. DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * , 2005 .
[8] William J. Buchanan,et al. Software agents and computer network security , 2000, Proceedings Seventh IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS 2000).
[9] Sze Li Harry Lim. Assessing the Effect of Honeypots on Cyber-Attackers , 2006 .
[10] Omer F. Rana,et al. Honeyware: A Web-Based Low Interaction Client Honeypot , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.
[11] Mario Guimaraes,et al. Overview of intrusion detection and intrusion prevention , 2008, InfoSecCD2008 2008.
[12] Nitin Gupta,et al. A Survey on Mobile Agent based Intrusion Detection System , 2011 .
[13] T. Verwoerd,et al. Active network security , 1999 .
[14] Hongli Zhang,et al. Using Honeyclients to Detect Malicious Websites , 2010, 2010 2nd International Conference on E-business and Information System Security.
[15] L. Leonardi,et al. MOBILE AGENT TECHNOLOGY : CURRENT TRENDS AND PERSPECTIVES , 1998 .
[16] Yang Wang,et al. Collecting Internet Malware Based on Client-side Honeypot , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[17] Ian Welch,et al. HoneyC - The low-interaction client honeypot , 2006 .
[18] Hongli Zhang,et al. Client honeypots: Approaches and challenges , 2010, 4th International Conference on New Trends in Information Science and Service Science.
[19] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[20] Ahmed Patel,et al. A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..