Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/113922
DC FieldValue
dc.titleReal-Time emulation of intrusion victim in honeyfarm
dc.contributor.authorHe, X.-Y.
dc.contributor.authorLam, K.-Y.
dc.contributor.authorChung, S.-L.
dc.contributor.authorChi, H.
dc.contributor.authorSun, J.-G.
dc.date.accessioned2014-12-01T08:22:44Z
dc.date.available2014-12-01T08:22:44Z
dc.date.issued2004
dc.identifier.citationHe, X.-Y.,Lam, K.-Y.,Chung, S.-L.,Chi, H.,Sun, J.-G. (2004). Real-Time emulation of intrusion victim in honeyfarm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3309 : 143-154. ScholarBank@NUS Repository.
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/113922
dc.description.abstractSecurity becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques or powerful tools to distinguish malicious traffic from the huge volume of production traffic. Although honeypots mainly aim at collecting information about hackers' behaviors, they are not very effective in that honeypot implementers tend to block or limit hackers' outbound connections to avoid harming non-honeypot systems, thus making honeypots easy to be fingerprinted. Additionally, the main concern is that if hackers were allowed outbound connections, they may attack the actual servers thus the honeypot could become a facilitator of the hacking crime. In this paper we present a new method to real-time emulate intrusion victims in a honeyfarm. When hackers request outbound connections, they are redirected to the intrusion victims which emulate the real targets. This method provides hackers with a less suspicious environment and reduces the risk of harming other systems. © Springer-Verlag 2004.
dc.sourceScopus
dc.subjectHoneypot
dc.subjectInterception proxy
dc.subjectIntrusion
dc.subjectReverse firewall
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.contributor.departmentINFORMATION SYSTEMS & COMPUTER SCIENCE
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume3309
dc.description.page143-154
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.