” Honeypots : A New Paradigm to Information Security ” by R . C . Joshi and Anjali Sardana CRC

نویسندگان

  • R. C. Joshi
  • Anjali Sardana
  • Nishant Doshi
چکیده

This book discusses about honeypot from history to present. The way authors added various case studies (including use of honeypot as savior) in chapters is admirable. The list of references for each chapter is also good way for the readers to easily locate the source of information. I suggest to add the further finding topic for each chapter in the future versions of books specially for researchers. The crisp intro and summary is also admirable as readers can get the bird eye view of chapters. In addition, each chapter start with chapter outline and ends with chapter summary. This is useful for reader to get the insights of chapter like abstract and conclusion of paper. Also, in many chapters various tools were explained with step-by-step method. In the preface, the authors have nicely covered the objective, intended audience, organization of the book and pre-requisites. For simplicity, below figure depicts the overview of chapters.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless Honeypot: Framework, Architectures and Tools

Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in wireless environment at different layers. This paper surveys a range of wireles...

متن کامل

Dual-Level Defense Framework for DDoS Attacked Network

DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...

متن کامل

Parallel Misuse and Anomaly Detection Model

In this paper a novel hybrid model is being proposed for misuse and anomaly detection. C4.5 based binary decision trees are used for misuse and CBA (Classification Based Association) based classifier is used for anomaly detection. Firstly, the C4.5 based decision tree separates the network traffic into normal and attack categories. The normal traffic is sent to anomaly detector and parallel att...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015