The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings.
DOI: 10.1109/perser.2004.1356776
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic honeypot design for intrusion detection

Abstract: Riad El-Solh / Beirut 1 107 2020 Lebanon Emails { i d o l , mas44, zoaO 1, hartail} @aub.edu.lb P.O.BOX 11-0236 / 3623 ABSTRACT A modem technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhat community), thus deriving their value from the unauthorized use of their resources. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
26
0
4

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(36 citation statements)
references
References 0 publications
2
26
0
4
Order By: Relevance
“…Xprobe2 [7] and Nmap are the active scanning components utilized in this program. Both Nmap and Xprobe2 use some of the same techniques, but each program emphasizes different protocols.…”
Section: Scanning Methodologymentioning
confidence: 99%
“…Xprobe2 [7] and Nmap are the active scanning components utilized in this program. Both Nmap and Xprobe2 use some of the same techniques, but each program emphasizes different protocols.…”
Section: Scanning Methodologymentioning
confidence: 99%
“…The solution aims at identifying intruders by analyzing the plentiful and global events of honeypots. Kuwatly [13] designs a dynamic honeypot for intrusion detection. In fact, the paper discusses the design of a dynamic honeypot, which is an autonomous honeypot capable of adapting in a dynamic and constantly changing network environment.…”
Section: Previous Workmentioning
confidence: 99%
“…All these services are to make the network environment constructed more authentic and reliable. Then we can study and analyze tools and means used by invaders as well as their motivation through capturing the information left by hackers when they are invading [1][2][3] .…”
Section: Current Researchmentioning
confidence: 99%