” Honeypots : A New Paradigm to Information Security ” by R . C . Joshi and Anjali Sardana CRC
نویسندگان
چکیده
This book discusses about honeypot from history to present. The way authors added various case studies (including use of honeypot as savior) in chapters is admirable. The list of references for each chapter is also good way for the readers to easily locate the source of information. I suggest to add the further finding topic for each chapter in the future versions of books specially for researchers. The crisp intro and summary is also admirable as readers can get the bird eye view of chapters. In addition, each chapter start with chapter outline and ends with chapter summary. This is useful for reader to get the insights of chapter like abstract and conclusion of paper. Also, in many chapters various tools were explained with step-by-step method. In the preface, the authors have nicely covered the objective, intended audience, organization of the book and pre-requisites. For simplicity, below figure depicts the overview of chapters.
منابع مشابه
Wireless Honeypot: Framework, Architectures and Tools
Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in wireless environment at different layers. This paper surveys a range of wireles...
متن کاملDual-Level Defense Framework for DDoS Attacked Network
DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...
متن کاملParallel Misuse and Anomaly Detection Model
In this paper a novel hybrid model is being proposed for misuse and anomaly detection. C4.5 based binary decision trees are used for misuse and CBA (Classification Based Association) based classifier is used for anomaly detection. Firstly, the C4.5 based decision tree separates the network traffic into normal and attack categories. The normal traffic is sent to anomaly detector and parallel att...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کامل