OU Portal
Log In
Welcome
Applicants
Z6_60GI02O0O8IDC0QEJUJ26TJDI4
Error:
Javascript is disabled in this browser. This page requires Javascript. Modify your browser's settings to allow Javascript to execute. See your browser's documentation for specific instructions.
{}
Close
Publikační činnost
Probíhá načítání, čekejte prosím...
publicationId :
tempRecordId :
actionDispatchIndex :
navigationBranch :
pageMode :
tabSelected :
isRivValid :
Record type:
stať ve sborníku (D)
Home Department:
Katedra informatiky a počítačů (31400)
Title:
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection
Citace
Sochor, T. a ZUZČÁK, M. Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection.
In:
22nd Int. Conf. Computer Networks: Communications in Computer and Information Science 2015-06-16 Brunow.
Cham: Springer International, 2015. s. 69-81. ISBN 978-3-319-19418-9.
Subtitle
Publication year:
2015
Obor:
Informatika
Number of pages:
13
Page from:
69
Page to:
81
Form of publication:
Tištená verze
ISBN code:
978-3-319-19418-9
ISSN code:
1865-0929
Proceedings title:
Communications in Computer and Information Science
Proceedings:
Mezinárodní
Publisher name:
Springer International
Place of publishing:
Cham
Country of Publication:
Sborník vydaný v zahraničí
Název konference:
22nd Int. Conf. Computer Networks
Místo konání konference:
Brunow
Datum zahájení konference:
Typ akce podle státní
příslušnosti účastníků:
Celosvětová akce
WoS code:
000365135900007
EID:
2-s2.0-84946410400
Key words in English:
Computer attack. Dionaea. Glastopf. Honeynet. Honeypot low-interaction. Internet threat. Kippo.SSH server emulation. Windows services emulation. Website emulation
Annotation in original language:
New threats from the Internet emerging every day need to be analyzed in order to prepare ways of protection against them. Various honeypots combined into honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows ser- vices), Kippo (emulating Linux services) and Glastopf (emulating web- site services) honeypots. The most important result consists in the fact that the differentiation among honeypots according to their IP address is relatively rough (usually two categories, i.e. academic and commercial networks, are usually distinguished, but the type of services in commer- cial sites is taken into account, too). Comparisons of results to other similar honeynets confirms the validity of the paper main conclusions.
Annotation in english language:
References
Reference
R01:
RIV/61988987:17310/15:A1801F18
Complementary Content
Deferred Modules
${title}
${badge}
${loading}
Deferred Modules