2004
DOI: 10.1007/978-3-540-30143-1_3
|View full text |Cite
|
Sign up to set email alerts
|

HoneyStat: Local Worm Detection Using Honeypots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
52
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 120 publications
(52 citation statements)
references
References 21 publications
0
52
0
Order By: Relevance
“…Honeypots [43] are fake computer systems intended to bait malicious actions that will be tracked and studied once these systems are probed or compromised. Honeypots are widely used in intrusion detection system [44], [45], [46]. Similarly, a honeynet [47] is proposed to assist the system administrator in identifying malicious traffic on the enterprise network.…”
Section: Related Workmentioning
confidence: 99%
“…Honeypots [43] are fake computer systems intended to bait malicious actions that will be tracked and studied once these systems are probed or compromised. Honeypots are widely used in intrusion detection system [44], [45], [46]. Similarly, a honeynet [47] is proposed to assist the system administrator in identifying malicious traffic on the enterprise network.…”
Section: Related Workmentioning
confidence: 99%
“…Provos (Provos, 2004) presented "honeyd," a honeypot software package that makes large-scale honeynet monitoring possible. Dagon et al (Dagon et al, 2004) presented the "HoneyStat" system to use coordinated honeypots to detect worm infections in local networks. Jiang and Xu (Jiang and Xu, 2004) presented a virtual honeynet system that has a distributed presence and centralized operation.…”
Section: Related Workmentioning
confidence: 99%
“…A "honeypot " is a special constructed computer or network trap designed to attract and detect malicious attacks (Honeypot, 2009). In recent years, honeypots have become popular, and security researchers have generated many successful honeypot-based attack analysis and detection systems (such as Anagnostakis et al (2005); Dagon et al (2004); Jiang and Xu (2004); Levine et al (2003); Provos (2004); Rajab et al (2007); Vrable et al (2005).) As more people begin to use honeypots in monitoring and defense systems, botmasters constructing and maintaining botnets will sooner or later try to find ways to avoid honeypot traps.…”
mentioning
confidence: 99%
“…Gu et al [10] discussed worm containment in local network using a small address space. Dagon et al [7] discuss a multi-parameter based worm detection mechanism using honeypots.…”
Section: Background and Related Workmentioning
confidence: 99%