Reactive Security – Intrusion Detection, Honeypots, and Vulnerability Assessment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment

Michael Meier studied computer science from 1993 to 1998 at the Brandenburg University of Technology Cottbus (Germany). After his graduation he joined the Network Security group of the chair Computer Networks and Communication Systems at the Computer Science Department of the same university, where he is working as research and teaching assistant. His research interests include security aspects...

متن کامل

M . Meier , U . Flegel , and H . König Reactive Security – Intrusion Detection , Honeypots , and Vulnerability Assessment

Michael Meier studied computer science from 1993 to 1998 at the Brandenburg University of Technology Cottbus (Germany). After his graduation he joined the Network Security group of the chair Computer Networks and Communication Systems at the Computer Science Department of the same university, where he is working as research and teaching assistant. His research interests include security aspects...

متن کامل

Vulnerability Assessment using Honeypots

Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data c...

متن کامل

Intrusion Detection System Using Advanced Honeypots

As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions[2]. In addition to maintaining low latency and poor performance for the client, filtering unaut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PIK - Praxis der Informationsverarbeitung und Kommunikation

سال: 2004

ISSN: 0930-5157,1865-8342

DOI: 10.1515/piko.2004.186