Optimal honeynet configuration in enterprise computer networks
- Authors: Aleinov Y.V1, Saushkin I.N2
-
Affiliations:
- Samara State University
- Samara State Technical University
- Issue: Vol 17, No 4 (2013)
- Pages: 107-114
- Section: Articles
- URL: https://bakhtiniada.ru/1991-8615/article/view/20952
- DOI: https://doi.org/10.14498/vsgtu1259
- ID: 20952
Cite item
Full Text
Abstract
Full Text
##article.viewOnOriginalSite##About the authors
Yuriy V Aleinov
Samara State University
Email: aleinov@gmail.com
Yuriy V. Aleinov 1, Academician Pavlov st., Samara, 443011, Russia
Ivan N Saushkin
Samara State Technical University
Email: saushkin@samgtu.ru
(Ph. D. Phys. & Math.), Chief of Dept., Dept. of Informatization & Telecommunications 244, Molodogvardeyskaya st., Samara, 443100, Russia
References
- А. В. Лукацкий, Обнаружение атак. СПб.: БХВ–Петербург, 2001. 624 с.
- L. Spitzner, Honeypot. Tracking Hackers. Boston: Addison-Wesley, 2003. 429 pp.
- И. В. Котенко, М. В. Степашкин, “Обманные системы для защиты информационных ресурсов в компьютерных сетях” // Тр. СПИИРАН, 2004. Т. 2, № 1. С. 211–230.
- C. Döring, Improving network security with honeypots. Honeypot project: Master’s thesis. Darmstadt: University of Applied Sciences Darmstadt, 2005. 123 pp.
- C. Hecker, K. L. Nance, B. Hay, “Dynamic Honeypot Construction” / In: Proc. of the 10th Colloquium for Information Systems Security Education. Adelphi, MD: University of Maryland, University College, 2006. Pp. 95–102.
- I. Kuwatly, M. Sraj, Z. A. Masri, H. Artail, “A Dynamic Honeypot Design for Intrusion Detection” / In: 2004 IEEE/ACS International Conference on Pervasive Services (ICPS’04), 2004. Pp. 95–104.
- Ю. В. Алейнов, “Принципы построения модели систем HONEYPOT” // Ползуновский вестник, 2012. № 3/2. С. 36–39.
- И. Д. Медведовский, П. В. Семьянов, Д. Г. Леонов, А. В. Лукацкий, Атака из Internet. М.: СОЛОН-Р, 2002. 368 с.
Supplementary files
