خط مشی دسترسیدرباره ما
ثبت نامثبت نام
راهنماراهنما
فارسی
ورودورود
صفحه اصلیصفحه اصلی
جستجوی مدارک
تمام متن
منابع دیجیتالی
رکورد قبلیرکورد بعدی
center : Transportasion Organization
Material Type : Latin Book
Record Number : 6334
Doc. No : 1759
Language of Document : English
Main Entry : Joshi, R. C.
Title & Author : Honeypots:a new paradigm to information security/ R.C. Joshi, Anjali Sardana
Publication Statement : Enfield, N.H.: Science Publishers ;Boca Raton, FL :Distributed by CRC Press,, c2011.
Page. NO : xiv, 328 p.: , ill. , 24 cm.
ISBN : 9781578087082
Notes : Language: انگلیسی
Notes : Print
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Machine generated contents note: 1.Honeypots -- 1.1.Background -- 1.1.1.History and Evolution of Honeypots -- 1.2.Honeypots -- 1.2.1.Generic Honeypot Model -- 1.3.Honeypots vs. Firewalls and Intrusion Detection Systems -- 1.3.1.Firewalls -- 1.3.2.Intrusion Detection Systems -- 1.3.3.Honeypots -- 1.4.Classification of Honeypots -- 1.4.1.Based on Usage -- 1.4.2.Based on Level of Interaction -- 1.4.3.Based on Hardware Deployment Type -- 1.4.4.Based on Role of Honeypot -- 1.5.Placement of Honeypots -- 1.5.1.External Placement -- 1.5.2.Internal Placement -- 1.5.3.DMZ Placement -- 1.5.4.On the Whole -- 1.6.Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms -- 1.6.1.Honeytokens -- 1.6.2.Honeypages -- 1.6.3.Honeynets -- 1.6.4.Honeyfarms -- 1.7.Value of Honeypots' -- 1.7.1.Low False-Positives -- 1.7.2.Early Detection -- 1.7.3.New Threat Detection -- 1.7.4.Defense in Depth -- 1.7.5.Other Advantages of Honeypots -- 1.8.Risks and Tradeoffs -- 1.9.Key Issues and Challenges -- 1.10.Summary -- Exercises -- References -- 2.Commercially Available Honeypots -- 2.1.Back Officer Friendly -- 2.2.Specter -- 2.3.Mantrap -- 2.4.Honeyd -- 2.5.Summary -- Exercises -- References -- 3.Honeynets -- 3.1.Overview of Honeynets -- 3.2.Value of Honeynets -- 3.2.1.Methods, Motives, and Evolving Tools -- 3.2.2.Trend Analysis -- 3.2.3.Incident Response -- 3.2.4.Testbed -- 3.3.Working of Honeynet -- 3.3.1.Controlling Data -- 3.3.2.Capturing Data -- 3.3.3.Collecting Data -- 3.4.Honeynet Architectures -- 3.4.1.Gen I -- 3.4.2.Gen II -- 3.5.Sweetening the Honeynets -- 3.6.Risks Associated with Honeynets -- 3.7.Summary -- Exercises -- References -- 4.Attacks and Role of Honeypots -- 4.1.Phases of Attack and Honeypots -- 4.1.1.Prevention -- 4.1.2.Detection -- 4.1.3.Response -- 4.1.4.Research -- 4.2.Worms and Virus Attacks -- 4.2.1.Worms -- 4.2.2.Virus Attacks -- 4.3.Spam and Phishing Mails -- 4.3.1.Spams -- 4.3.2.Phishing -- 4.4.Distributed Denial of Service Attacks -- 4.5.Summary -- Exercises -- References -- 5.Static Honeypots -- 5.1.Honeypot as Detection Systems -- 5.1.1.Japonica: Objectives and Requirements -- 5.1.2.Framework and Components -- 5.2.Honeypot as Deception Systems -- 5.3.Summary -- Exercises -- References -- 6.Virtual Honeypots -- 6.1.Virtual Honeypot: VMware Workstation -- 6.2.Data Capture on Virtual Honeypots -- 6.3.Raw Disks and Virtual Disks -- 6.4.Virtual Honeynet -- 6.5.Case Study -- 6.6.Summary -- Exercises -- References -- 7.Dynamic Honeypots -- 7.1.Issues with Static Honeypots -- 7.2.Dynamic Honeypots -- 7.3.Dynamic Honeypot Design -- 7.3.1.Proposed Design Overview -- 7.3.2.Active Probing -- 7.3.3.Passive Fingerprinting -- 7.3.4.Honeyd -- 7.3.5.The Database -- 7.3.6.Dynamic Honeypot Engine -- 7.4.Dynamic Honeypot Construction -- 7.4.1.Graphic User Interface -- 7.5.Benefits -- 7.6.Summary -- Exercises -- References -- 8.Wireless Honeypots -- 8.1.Introduction to Wireless Local Area Networks -- 8.2.Basic Wireless Concepts -- 8.2.1.Stations and APs -- 8.2.2.Infrastructure and Ad Hoc Modes -- 8.2.3.Frames -- 8.2.4.Authentication -- 8.2.5.Association -- 8.3.802.11 Security -- 8.3.1.Access Control List -- 8.3.2.WEP (Wired Equivalent Privacy) -- 8.3.3.WPA (Wi-Fi Protected Access) -- 8.3.4.802.11i -- 8.4.Wireless Attacks: From A Blackhat's Perspective -- 8.4.1.Passive Attacks on Wireless Networks -- 8.4.2.Active Attacks on Wireless Networks -- 8.4.3.Man-in-the-Middle Attacks on Wireless Networks -- 8.4.4.Jamming Attacks on Wireless Networks -- 8.4.5.Some other Attacks -- 8.5.Wireless Honeypots -- 8.5.1.Needs and Goals of Wireless Honeypots -- 8.5.2.Wireless Honeypot History -- 8.5.3.Theory and Design -- 8.5.4.Wireless Activity -- 8.5.5.Wireless Architectures -- 8.5.6.Some Practical examples to create Honeypots -- 8.5.7.Existing Wireless Architectures on Wireless Honeypots -- 8.5.8.Wireless Tools -- 8.5.9.Wireless Honeypot using Wired Tools -- 8.6.Limitations -- 8.7.Summary -- Exercises -- References -- 9.Applications of Honeypots -- 9.1.Defense against Automated Attacks -- 9.2.Protection against Human Intruders -- 9.3.Surgical Detection Methods -- 9.4.Cyber-Forensics -- 9.5.Network Surveillance -- 9.6.Forensic Analysis -- 9.7.Tactical Battlefield -- 9.8.Use as Deterrent -- 9.9.Research Purpose -- 9.10.Summary -- Exercises -- References -- 10.Anti-Honeypot Technology -- 10.1.Network Issues -- 10.1.1.Honeypot and Fingerprinting: Practical Examples -- 10.2.System Issues -- 10.3.Techniques For Honeypot Detection -- 10.3.1.Honeypot Hunters -- 10.3.2.Honeypot Detection in Advanced Botnet Attacks -- 10.3.3.Mapping Internet Sensors With Probe Response Attacks -- 10.4.Countermeasure for Detection of Honeypot Deployment -- 10.4.1.The Honeyanole System -- 10.4.2.A Hybrid Honeypot Architecture for Scalable Network Monitoring -- 10.5.Summary -- Exercises -- References -- 11.Honeypots and Network Forensics -- 11.1.Network Forensics -- 11.1.1.Classification of Network Forensics Systems -- 11.1.2.Motivation for Network Forensics -- 11.1.3.Honeypot approaches for Network Forensics -- 11.2.Honeypot as Network Forensic Analysis Tools -- 11.3.Honeypot Based Network Forensics Frameworks -- 11.3.1.Generic Process Model -- 11.3.2.Honeypot Based Frameworks for Forensics -- 11.4.Summary -- Exercises -- References.
Subject : Computer security
Subject : Computer hackers
Subject : Firewalls (Computer security)
Subject : Computer networks, Security measures
Subject : Wireless communication systems, Security measures
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9‬‭.A25,J66 2011‬
Added Entry : Sardana, Anjali
electronic file name : Honeypots A New Paradigm to Information Security.pdf
 
 
 
(در صورت عدم وضوح تصویر اینجا را کلیک نمایید)