Abstract:
This paper introduced network honeypot technology, from the honeypot bait, detection technology, recording of a detailed analysis of three aspects of the network honeypot...Show MoreMetadata
Abstract:
This paper introduced network honeypot technology, from the honeypot bait, detection technology, recording of a detailed analysis of three aspects of the network honeypot operation mechanism, discussed the value, strengths and weaknesses of network honeypot technology, analyzed the offensive and defensive technology game in a network honeypot system, and looked forward to the core technology trends and the challenges for it.
Date of Conference: 27-29 June 2011
Date Added to IEEE Xplore: 04 August 2011
ISBN Information:
Googling the Internet: Profiling Internet Endpoints via the World Wide Web
Ionut Trestian,Supranamaya Ranjan,Aleksandar Kuzmanovic,Antonio Nucci
A novel semantic knowledge engine using automated knowledge extraction from World Wide Web
Venkatesh Mabbu,Abu Asaduzzaman,Muhammad F. Mridha
A stateful intrusion detection system for World-Wide Web servers
G. Vigna,W. Robertson,Vishal Kher,R.A. Kemmerer
World Wide Web: whence, whither, what next?
H. Schulzrinne
Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks
D. Achjari,M. Quaddus
Redefining collaboration through the creation of World Wide Web sites
C.A. Reilly,B. L'Eplattenier
Dial-in World-Wide Web (WWW) information services for use within a local community network
A.R. Bugos
Developing an integrated testing environment using the World Wide Web technology
J.Z. Gao,C. Chen,Y. Toyoshima,D.K. Leung