SECURING WMN USING HYBRID HONEYPOT SYSTEM
暂无分享,去创建一个
[1] H. Owen,et al. Application of a methodology to characterize rootkits retrieved from honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[2] Paramjeet Rawat. INTEGRATED SECURITY FRAMEWORK FOR HYBRID WIRELESS MESH NETWORKS , 2010 .
[3] Reinhard German,et al. Flow-based Worm Detection using Correlated Honeypot Logs , 2011 .
[4] Kyi Lin Lin Kyaw. Hybrid Honeypot System for Network Security , 2008 .
[5] Tarun Kumar,et al. Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .
[6] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[7] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[8] Yogendra Kumar Jain,et al. Honeypot based Secure Network System , 2011 .
[9] Chengyu Song,et al. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots , 2007, ICICS.
[10] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[11] Ahmad Hassan,et al. Collecting malware from distributed honeypots — Honeypharm , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[12] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.