Reference

Published on February 2017 | Categories: Documents | Downloads: 45 | Comments: 0 | Views: 169
of 1
Download PDF   Embed   Report

Comments

Content

REFERENCES
[1] A.Cenys, D.Rainys,L.Radvilavicius and N. Goranin, Implementation of Honeytoken Module In DBMS Oracle 9ir2 Enterprise Edition for Internal Malicious Activity

Detection, IEEE Computer Society's TC on Security and Privacy ,2005 [2] A. D. Lakhani, Deception techniques using Honeypots. MSc Thesis, ISG, Royal Holloway, University of London, 2003. [3] F. Cohen, The Use of Deception Techniques: Honeypots and Decoys, University of New Haven, The Handbook of Information Security, Volume III, Parti: 181 [4] Honeynet Project, Know Your Enemy: Defining Virtual Honey-nets. 2003. URL: http://old.honeynet.org/papers/virtual/ [5] I. Mokube and M..Adams, Honeypots: Concepts, Approaches, and Challenges, ACM Southeast Regional Conference,Proceedings of the 45th annual, Winston-Salem, North Carolina ,Pages 321 - 326 ,2007 [6] K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis, Detecting Targeted Attacks Using Shadow Honeypots, Proceedings 14th USENIX Security Symposium, Pages 129-144, 2005 [7] L. Oudot and T. Holz , Defeating Honeypots: Network Issues, Part 2, Security Focus, 2004. http://www.securityfocus.com/infocus/1803 [8] L. Spitzner, Honeytokens: The Other Honeypot, Security Focus, 2003. URL:http://www.securityfocus.com/infocus/1713 [9] N. Provos and T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Addisn-Wesley, 2008

Dept of CSE, TCE Gadag

Page 20

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close