Other Honeypot Applications

This chapter addresses current available concealment techniques for honeypot, and applications of honeypot for security and forensics.

[1]  Deli Liu,et al.  Mimicry Honeypot: A Brief Introduction , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[2]  Matt Bishop,et al.  Investigating the Implications of Virtual Machine Introspection for Digital Forensics , 2009, 2009 International Conference on Availability, Reliability and Security.

[3]  Van-Hau Pham,et al.  Honeypot trace forensics: The observation viewpoint matters , 2011, Future Gener. Comput. Syst..

[4]  Xuxian Jiang,et al.  Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots , 2011, SecureComm.

[5]  Masaya Nakayama,et al.  INTERCEPT: high-interaction server-type honeypot based on live migration , 2014, SimuTools.

[6]  Miao Yu,et al.  A Virtualization Based Monitoring System for Mini-intrusive Live Forensics , 2013, International Journal of Parallel Programming.

[7]  Gabi Dreo Rodosek,et al.  A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[8]  Shouhuai Xu,et al.  Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study , 2013, IEEE Transactions on Information Forensics and Security.

[9]  P. Biondi,et al.  Honeypot forensics , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[10]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[11]  Vern Paxson,et al.  The Matter of Heartbleed , 2014, Internet Measurement Conference.

[12]  H.L. Owen,et al.  TimeKeeper: A Metadata Archiving Method for Honeypot Forensics , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[13]  Qassim Nasir,et al.  Honeypots Aiding Network Forensics: Challenges and Notions , 2013, J. Commun..

[14]  Brian Cusack BOTNET FORENSIC INVESTIGATION TECHNIQUES AND COST EVALUATION , 2014 .

[15]  G. Conti,et al.  Real-time and forensic network data analysis using animated and coordinated visualization , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[16]  Rajdeep Niyogi,et al.  Network forensic frameworks: Survey and research challenges , 2010, Digit. Investig..

[17]  N.C. Rowe,et al.  Fake Honeypots: A Defensive Tactic for Cyberspace , 2006, 2006 IEEE Information Assurance Workshop.