|
[1] Levine, J.G, Grizzard, J.B. and Owen, H.L, “Using Honeynets to Protect Large Enterprise Networks,” IEEE Security & Privacy, vol. 2, no. 6, pp. 56-58, Nov. 2004. [2] Robert R, “CSI Computer Crime and Security Survey”, pp 6-8, FBI, Dec. 2009. [3] Provos, N, “A Virtual Honeypot Framework,” In Proceedings of the 13th USENIX Security Symposium, pp. 1-14, Aug. 2004. [4] Spitzner, L, “Honeypots: Tracking Hackers, ” ISBN 0-321-10895-7 2nd Printing, Oct. 2002. [5] Chuvakin, A, “Honeynets: High Value Security Data: Analysis of Real Attacks Launched at a Honeypot,” Network Security (2003:8), pp. 11-15, Aug. 2003. [6] The Honeynet Project,http://www.honeynet.org/ [7] Spitzner, L., “To Build a Honeypot,” http://www.spitzner.net/honeypot.html [8] Kuwatly, I, Sraj, M, Masri, Z.A, and Artail, H, “A Dynamic Honeypot Design for Intrusion Detection,” IEEE Computer Society, Nov. 2004. [9] Artaila, H., Safab, H., Sraja, M., Kuwatlya, I. and Al-Masria, Z. “A Hybrid Honeypot Framework for Improving Intrusion Detection Systems in Protecting Organizational Networks,” Comuters & Security, vol. 25, pp. 274-288, June 2006. [10] C.H. Lin, C.H. Yang, S.J. Chen, and J.S. Wu, “An Implementation of a Malware Collection and Data Sharing System Based on Honeypot, ” The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, pp. 82-96, Aug. 2010. [11] Mokube, I. and Adams, M., “Honeypots: concepts, approaches, and challenges, ” In ACM-SE 45: Proceedings of the 45th annual southeast regional conference (New York, NY, USA), pp. 321–326, 2007. [12] Diebold P, Hess A, and Schäfer G, “A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks, ” 14th Kommunikation in Verteilten Systemen, Feb. 2005. [13] Mohammadi S, and Nikkhahan B, “A fault tolerance honeypots network for securing E-government, ” 2009 International e-Conference on Advanced Science and Technology, pp. 13-17, March 2009. [14] Xiaoyan S., Yang W., Jie R., Yuefei Z., and Shengli L., “Collecting Internet Malware Based on Client-side Honeypot, ” 2008 The 9th International Conference for Young Computer Scientists, pp. 1493 - 1498, Nov. 2008. [15] Know Your Enemy: Honeynets,http://old.honeynet.org/papers/honeynet/index.html [16] Abbasi F.H, Harris R.J, “Experiences with a Generation III Virtual Honeynet, ” Telecommunication Networks and Applications Conference (ATNAC), pp. 1-6, Nov. 2009. [17] The Honeynet Project,http://www.honeynet.org/. [18] Taiwan Honeynet Project, http://www.honeynet.org.tw/ [19] Robert M., “Experiences with Honeypot Systems: Development, Deployment, and Analysis, ” in Proceedings of the 39th Annual International Conference on System Sciences, Hawaii, Jan. 2006. [20] Levine J., Labella R., Owen H., Contis D., and Culver B., “The use of Honeynets to detect exploited systems across large enterprise networks, ” Information Assurance Workshop on IEEE Systems, Man and Cybernetics Society, pp. 92-99, Sep. 2003. [21] Know Your Enemy: GenII Honeynets,http://old.honeynet.org/papers/gen2/index.html [22] Spitzner L., “Honeypots: Catching the Insider Threat, ” in Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, Aug. 2003. [23] Zhuge J., Holz T., Han X., Song C., and Zou W., “Collecting Autonomous Spreading Malware Using High-interaction Honeypots, ” the 9th International Conference on Information and Communications Security (ICICS’07), Zhengzhou China, Dec. 2007. [24] Balas E, and Viecco C, “Towards a Third Generation Data Capture Architecture for Honeynets, ” Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, Aug. 2005. [25] Dornseif M., Freiling F., and Gedicke N., “Design and Implementation of the Honey-DVD, ” Proc. 2006 IEEE Workshop on Information Assurance, US Military Academy, West Point, NY, June 2006. [26] Sven K., Julian B. Grizzard, Henry L. Owen, and John G. Levine, “Use of Honeynets to Increase Computer Network Security and User Awarenes, ” Journal of Security Education, vol 1, issue 2/3, pp. 23-37, April 2005. [27] Honeynet Project and Research Alliance, “Know Your Enemy: Honeywall CDROM,” http://old.honeynet.org/papers/cdrom/roo/index.html, May 2009. [28] Know Your Enemy: Virtual Honeynets, http://old.honeynet.org/papers/virtual/ [29] Aaron Lanoy and Gordon W. Romney (2006), “A Virtual Honey Net as a Teaching Resource, ” Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International Conference on, pp. 10-13, July 2006. [30] O'Leary M., Azadegan S., Lakhani J., “Development of a Honeynet Laboratory: a Case Study, ” Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006. SNPD 2006. Seventh ACIS International Conference on, pp. 401-406, June 2006. [31] Honeywall,https://projects.honeynet.org/honeywall/ [32] Viecco, C, “Improving Honeynet Data Analysis,” IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY, pp.17 – 19, June 2007. [33] Johnson E.L, Koenig J.M, and Wagner P, “Development and Implementation of the Honeynet on a University Owned Subnet, ” n Proc. 40th The Midwest Instruction and Computing Symposium, April 2007. [34] Jan Gerrit Göbel, “Advanced honeynet based intrusion detection, ” Aachen, den 27, July 2006. [35] Pei-Sheng Huang, Chung-Huang Yang, and Tae-Nam Ahn, “Design and Implementation of A Distributed Early Warning System Combined with Intrusion Detection System and Honeypot, ” International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), Daejeon, Korea, Aug. 2009. [36] Kyi Lin Lin Kyaw, “Hybrid Honeypot System for Network Security, ” World Academy of Science, Engineering and Technology 48, pp. 260-270, 2008. [37] Zanoramy W., Zakaria A., Rohaidah, S., and Norazah A, “Deploying virtual honeypots on virtual machine monitor,” in Proceedings of the IEEE ITSim International Symposium on Information Technology, pp. 1-5, Sep. 2008. [38] Defibaugh-Chavez P., Veeraghattam R., Kannappa M., Mukkamala S., Sung, A.H., “Network Based Detection of Virtual Environments and Low Interaction Honeypots,” Proceedings of the 2006 IEEE SMC, Workshop on Information Assurance, pp. 283-289, July 2006. [39] David W, Jamie R, “The Honeynet Project: Data Collection Tools, Infrastructure, Archives and Analysis,” WOMBAT Workshop on Information Security Threats Data Collection and Sharing, pp. 24-30, May 2008. [40] Ponweera R.J.C., Koggalage R., Wickramage N., “Evaluation and demonstration of the usage of a virtual honeynet for monitoring and recording online attacks, ” Industrial and Information Systems, 2007. ICIIS 2007. International Conference on, pp. 21-26, Aug. 2007. [41] GeoIP, http://www.maxmind.com/app/ip-location [42] State of the Internet Report, http://www.akamai.com/stateoftheinternet/, http://www.akamai.com/dl/whitepapers/Akamai_State_Internet_Q4_2010.pdf [43] Koobface - Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Koobface
|