Вы находитесь на странице: 1из 1

REFERENCES

[1] A.Cenys, D.Rainys,L.Radvilavicius and N. Goranin, Implementation of Honeytoken Module In DBMS Oracle 9ir2 Enterprise Edition for Internal Malicious Activity

Detection, IEEE Computer Society's TC on Security and Privacy ,2005 [2] A. D. Lakhani, Deception techniques using Honeypots. MSc Thesis, ISG, Royal Holloway, University of London, 2003. [3] F. Cohen, The Use of Deception Techniques: Honeypots and Decoys, University of New Haven, The Handbook of Information Security, Volume III, Parti: 181 [4] Honeynet Project, Know Your Enemy: Defining Virtual Honey-nets. 2003. URL: http://old.honeynet.org/papers/virtual/ [5] I. Mokube and M..Adams, Honeypots: Concepts, Approaches, and Challenges, ACM Southeast Regional Conference,Proceedings of the 45th annual, Winston-Salem, North Carolina ,Pages 321 - 326 ,2007 [6] K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis, Detecting Targeted Attacks Using Shadow Honeypots, Proceedings 14th USENIX Security Symposium, Pages 129-144, 2005 [7] L. Oudot and T. Holz , Defeating Honeypots: Network Issues, Part 2, Security Focus, 2004. http://www.securityfocus.com/infocus/1803 [8] L. Spitzner, Honeytokens: The Other Honeypot, Security Focus, 2003. URL:http://www.securityfocus.com/infocus/1713 [9] N. Provos and T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Addisn-Wesley, 2008

Dept of CSE, TCE Gadag

Page 20

Вам также может понравиться