A Method for Historical Ext3 Inode to Filename Translation on Honeypots
暂无分享,去创建一个
[1] David Lie,et al. Using VMM-based sensors to monitor honeypots , 2006, VEE '06.
[2] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[3] Henry Owen,et al. A program behavior matching architecture for probabilistic file system forensics , 2008, OPSR.
[4] H. Owen,et al. Establishing trust in black-box programs , 2007, Proceedings 2007 IEEE SoutheastCon.
[5] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[6] Alok Mishra,et al. An efficient technique for enhancing forensic capabilities of Ext2 file system , 2007, Digit. Investig..
[7] Florian P. Buchholz,et al. Design and Implementation of Zeitline: a Forensic Timeline Editor , 2005, DFRWS.
[8] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[9] H.L. Owen,et al. TimeKeeper: A Metadata Archiving Method for Honeypot Forensics , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[10] Steve R. Kleiman,et al. Vnodes: An Architecture for Multiple File System Types in Sun UNIX , 1986, USENIX Summer.
[11] Simson L. Garfinkel,et al. Anti-Forensics: Techniques, Detection and Countermeasures , 2007 .