The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks

نویسندگان

  • John G. Levine
  • Richard LaBella
  • Henry L. Owen
  • Didier Contis
  • Brian Culver
چکیده

©2003 IEEE. Person or promotional purpo copyrighted compon Abstract – Comput continue to be compro in spite of the fact t security mechanism at Enterprise Networks, university, are very inv to exploit networks. L many machines runni networks normally ha high speed/high band to the requirement administrators are re place on users on thes on these networks ma traffic within the en Honeynet can be use identifying malicious t very nature, a Honeyn not be generating or r or from the Honeynet enterprise network to a a compromised enterp

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Honeynets to Protect Large Enterprise Networks

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/04/$20.00 © 2004 IEEE ■ IEEE SECURITY & PRIVACY 73 them and vice versa. They’re also subject to attacks that could cause them to cease operations temporarily or permanently. An attacker could compromise the system and gain root access—that is, gain the ability to control the system as if the attacker were the system administrator. Network admin...

متن کامل

Presenting a comprehensive framework of effective factors, behavior and consequences of using enterprise social networks

Aim: The purpose of this paper is to determine the factors affecting the use of enterprise social networks, the types of usage behavior and the consequences of using these networks. Methodology: This is a descriptive study. The qualitative inquiries of previous researches in the social networking enterprise had been investigated by means of  meta-synthesis. A total of 470 found source of meta-s...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Honeynet Clusters as an early Warning System for Production Networks

Due to the prevalence of distributed and coordinated Internet attacks, many researchers and network administrators study the nature and strategies of attackers. To analyze event logs, using intrusion detection systems and active network monitoring, Honeynets are being deployed to attract potential attackers in order to investigate their modus operandi. Our goal is to use Honeynet clusters as re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003