Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/41430
DC FieldValue
dc.titleApplication of content computing in honeyfarm
dc.contributor.authorHuang, Y.-Y.
dc.contributor.authorLam, K.-Y.
dc.contributor.authorChung, S.-L.
dc.contributor.authorChi, C.-H.
dc.contributor.authorSun, J.-G.
dc.date.accessioned2013-07-04T08:27:22Z
dc.date.available2013-07-04T08:27:22Z
dc.date.issued2005
dc.identifier.citationHuang, Y.-Y.,Lam, K.-Y.,Chung, S.-L.,Chi, C.-H.,Sun, J.-G. (2005). Application of content computing in honeyfarm. Lecture Notes in Computer Science 3325 : 211-222. ScholarBank@NUS Repository.
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/41430
dc.description.abstractCurrently there are a wide range of techniques dedicated to network security among which honeyfarm is one of the newest development. Honeyfarm provides replication of web sites aiming to redirect hackers from the corresponding production sites. To achieve the goal, transparency and quick access are the basic requirements for honeyfarm. Content delivery network (CDN) is one method for providing replicated web sites and the technique is able to address the requirement for rapid content delivery by redirecting clients to the replicas. However, there is no transparency in the redirection. Furthermore, CDN also redirect clients in a centralized way which will induce latency in content delivery. This paper describes the ways to improve CDN to make it suitable to use as a routing mechanism for honeyfarm. © Springer-Verlag Berlin Heidelberg 2004.
dc.sourceScopus
dc.subjectContent delivery network
dc.subjectDistributed computing
dc.subjectHoneyfarm
dc.subjectNetwork security
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.sourcetitleLecture Notes in Computer Science
dc.description.volume3325
dc.description.page211-222
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.