نتایج جستجو برای: honeypot
تعداد نتایج: 652 فیلتر نتایج به سال:
We propose a defense mechanism in computer network using gate-translator, double honeynet, sticky honeypot and antivirus engine of CloudAV, which attracts polymorphic worms. An algorithm is proposed to detect and remove the polymorphic worms and innocuous traffic related packets. Future antivirus is implemented on logically detached unused system.
Distributed Denial of Service (DDoS) attacks can effect the steady functioning of any network, posing a severe security threat. Concentrated single source DDoS attacks consume huge resources like bandwidth in a very small duration and have direct impact at ISP level, thus making them easily detectable. In contrast, diluted low rate DDoS attacks lead to graceful degradation of network over a lon...
Protecting computer and information systems from security attacks is becoming an increasingly important task for system administrators. Honeypots are a technology often used to detect attacks and collect information about techniques and targets (e.g., services, ports, operating systems) of attacks. However, managing a large and complex network of honeypots becomes a challenge given the amount o...
In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the firewall IPTable, we set up a testing environment and use a simple watching dog to manage capture data. We also discuss implementation of the system and some future research topics.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید