Honeypots: Why We Need A Dynamics Honeypots?
Honeypots has emerged to become a great tool for administrator to track down the intruder, prevent attack by intruder and log all the activity done by the intruder.
| Main Authors: | Budiarto, Rahmat, Samsudin, Azman, Chuah, Wee Heong, Noori, Salah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/6865/ http://eprints.usm.my/6865/1/Honey_Why_we_need_a_dynamics_honeypots.pdf |
Similar Items
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)
by: Amran, Salleh
Published: (2005)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Network Isolation and Security Using Honeypot
by: Foo, Ce Sheng
Published: (2019)
by: Foo, Ce Sheng
Published: (2019)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Semi-fluid: A Content Distribution Model For Faster
Dissemination Of Data
by: Saleh, Salah Noori
Published: (2010)
by: Saleh, Salah Noori
Published: (2010)
Semi-Fluid: A Content Distribution Model For Faster Dissemination Of Data
by: Saleh, Salah Noori
Published: (2010)
by: Saleh, Salah Noori
Published: (2010)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Reducing honeypot log storage capacity using cron job with PERL-SCRIPT / Nur Muhammad Irfan Abu Hassan
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Color-based Image Retrieval Using Wavelet.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by: Syukur, Mohammad, et al.
Published: (2007)
by: Syukur, Mohammad, et al.
Published: (2007)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Survey And New Approach In Service Discovery And Advertisement For Mobile Ad Hoc Networks.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
An Intelligent Method. For Processing String In 3-D Based
On Its Minimum Energy.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Performance Evaluation Of Unidirectional Lightweight Encapsulation Using ns-2 And DVB-S Testbed.
by: Ang, Way-Chuang, et al.
Published: (2007)
by: Ang, Way-Chuang, et al.
Published: (2007)
System Development: What, Why, When And How CASE Tools Should Support Novice Software Engineers.
by: Sulaiman, Shahida, et al.
Published: (2007)
by: Sulaiman, Shahida, et al.
Published: (2007)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
ETC training management system / the needs and expectations for training management system in Thailand
by: Adam, Metinee
Published: (2009)
by: Adam, Metinee
Published: (2009)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Similar Items
-
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020) -
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004) -
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005) -
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)