A study for some experiences of the operation of highly interactive decoy system (Japanisch)

Transactions of the Information Processing Society of Japan
; 2004
  • Neue Suche nach:

With the rapid increase of the number of Internet users, now network use is indispensable to individuals and to organization. Although Internet provides us various services and our lives depend on it heavily, we have many problems of suspicious accesses. However, there are few opportunities to recognize what an actual exploit is, and it is difficult to recognize of the security, that is not visible. In this paper, we deployed a decoy system based on the highly interactive level Honeynet Project has defined. This system enables to be decoy on the OS level, making intruders act freely without restriction. It records not only the known activities, but unknown vulnerabilities and activities without being notified by the intruders. Currently, the concept of highly interactive level decoy system is new, the information in these system is not fully available. From these references, we have conducted an operation of the system, while adding some new features that were necessary. By analyzing all the logs from the system, we describe problems and propose the suitable operation methods.

Wie erhalte ich diesen Titel?


Inhaltsverzeichnis – Band 45, Ausgabe 8

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Nachweisen der enthaltenen Aufsätze. Die Anzeige der Jahrgänge kann aufgrund fehlender Aufsatznachweise unvollständig oder lückenhaft sein, obwohl die Zeitschrift komplett in der TIB verfügbar ist.

Proposal of an iris identification scheme hiding iris codes
Ota, H. / Kiyomoto, S. / Tanaka, T. | 2004
Design of security architecture for beyond 3G mobile terminals
Kiyomoto, S. / Tanaka, T. / Yoshida, M. / Kuroda, M. | 2004
On anonymity metrics for practical anonymous communication protocols
Kitazawa, S. / Soshi, M. / Miyaji, A. | 2004
A study for some experiences of the operation of highly interactive decoy system
Shibuya, Y. / Koike, H. / Takada, T. / Yasumura, M. / Ishii, T. | 2004
Routing information based packet filtering for IP spoofing prevention
Nakano, M. / Matsumoto, T. | 2004
Regression test selection based on intermediate code for virtual machines
Koju, T. / Takada, S. / Doi, N. | 2004
Generation of character animation holding a tool with its both hands by using three 6DOF trackers
Kawasaki, R. / Kitamura, Y. / Kishino, F. | 2004
A technique to reduce false positives of network IDS with machine learning
Ohya, H. / Miyaji, R. / Kawaguchi, N. / Shigeno, H. / Okada, K. | 2004

Ähnliche Titel


    Freier Zugriff
    YAHAGI JUN | Europäisches Patentamt | 2011

    Freier Zugriff
    ESSARY JASON M / ESSARY ROBERT L | Europäisches Patentamt | 2018

    Freier Zugriff
    KUBINEC SHANE | Europäisches Patentamt | 2014
  • Decoy

    Lewis, E. | British Library Online Contents | 2018
  • Decoy

    Freier Zugriff
    TITHECOTT GEOFF | Europäisches Patentamt | 2013