Honeypot: a supplemented active defense system for network security
Citations
218 citations
Cites background from "Honeypot: a supplemented active def..."
...[45] report an investigation on the HP concept....
[...]
137 citations
104 citations
Cites background from "Honeypot: a supplemented active def..."
...VAGUE TIMESTAMPS. ype Software Maintenance Free Focus First Last Services / Applications Design / Details DTK [31] 1997 1999 3 SMB, SSH, DNS, FTP, Netstat(++) implement many known vulnerabilities BOF [32] 1998 1999 3 Back Orifice, Telnet, SMTP(+) waste intruders time, easy deployment NetFacade [42] 1998 2002* 8 not specified class C network emulation CyberCop String [33] 1999 1999 8 Telnet, FTP, SendMai...
[...]
...nter attacks [...] the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.” [31]. In 1998, Back Officer Friendly (BOF) [32] was developed, originally to notice attacks by the remote administration tool Back Orifice. BOF has an outstanding ease of use considering the early stages of this research area, is runnable on Unix- ...
[...]
95 citations
Cites background from "Honeypot: a supplemented active def..."
...[43] were among the first to classify honeypots in 2003....
[...]
...The main difference between the works in [43]–[45] and ours is the scope of the survey....
[...]
68 citations
References
553 citations
"Honeypot: a supplemented active def..." refers background or methods in this paper
...Some of them such as worms, attack scripts and DDoS attacks are truly powerful and destruct [I, 2 , 3, 231....
[...]
...Data control can be replaced by a 2 -layer gateway, which would modify several bytes of packets considered to be attacks [16]....
[...]
...In 2 .1.4, we interpret two essential requirements of honeypotdata control and data caputure....
[...]
...Basic conceptions, general model and taxonomy for honeypot are given in section 2 . Key problem and focuses in honeypot research are addressed in section 3. Typical honeypot system is reviewed in section 4. Finally, trends of honeypot and the features that should be taken into account while designing future honeypot are summarized....
[...]
...Related fields cover firewall, router and IDS. 2 . General Model for Honeypot...
[...]
548 citations
"Honeypot: a supplemented active def..." refers background in this paper
... 4 . Honeynet represents the highest level of research...
[...]
...In 2.1. 4 , we interpret two essential requirements of honeypotdata control and data caputure....
[...]
...We will cover different kinds of honeypot in section 4 ....
[...]
...It does nothing to attacks using proper service ports [ 4 ]....
[...]
...Spoofed ip and encapsulation are used to trick attackers U61. 4 . Virtual Honeypot...
[...]
546 citations
395 citations
378 citations