Nothing Special   »   [go: up one dir, main page]

Provos et al., 2004 - Google Patents

A Virtual Honeypot Framework.

Provos et al., 2004

View HTML
Document ID
2680119627472771314
Author
Provos N
et al.
Publication year
Publication venue
USENIX Security Symposium

External Links

Snippet

A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after …
Continue reading at www.usenix.org (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Provos A Virtual Honeypot Framework.
Nawrocki et al. A survey on honeypot software and data analysis
Provos Honeyd-a virtual honeypot daemon
Wagner et al. Experiences with worm propagation simulations
Li et al. A survey of internet worm detection and containment
Osanaiye Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing
CN111756712B (en) Method for forging IP address and preventing attack based on virtual network equipment
Korniyenko et al. Implementation of the information resources protection based on the CentOS operating system
Ensafi et al. Idle port scanning and non-interference analysis of network protocol stacks using model checking
Osanaiye et al. TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment
Jones et al. Pptp vpn: An analysis of the effects of a ddos attack
Bekeneva et al. Simulation of DDoS-attacks and protection mechanisms against them
Roslan A Comparative Performance of Port Scanning Techniques
Chen et al. Detecting Internet worms at early stage
Bhatia Detecting distributed denial-of-service attacks and flash events
Yen Detecting stealthy malware using behavioral features in network traffic
Khirwadkar Defense against network attacks using game theory
Chen et al. A pragmatic methodology for testing intrusion prevention systems
Shing An improved tarpit for network deception
Salimova A virtual honeypot framework
Wei et al. Tools for worm experimentation on the DETER testbed
Sikora et al. Design of advanced slow denial of service attack generator
Fu et al. Camouflaging virtual honeypots
Treseangrat Performance analysis of defense mechanisms against UDP flood attacks
Zaballos et al. Testing Network Security Using OPNET