International Journal of Soft Computing
Year:
2012
Volume:
7
Issue:
3
Page No.
131 - 134
References
Cheswick, W., 1997. An Evening with Berferd. In: Internet be Sized: Countering Internet Scuffles, Denning, D.E. and P.J. Denning (Eds.). ACM Press/Addison Wesley, New York, USA., pp: 103-117.
Cohen, F., 1987. Computer viruses: Theory and experiments. Comput. Security, 6: 22-35.
CrossRef | Direct Link | Ghose, A.K., J. Kanken and F. Charon, 1998. Detecting anomalous and unknown intrusions against programs. Proceedings of the 14th Annual Computer Security Applications Conference, December 7-11, 1998, Phoenix, AZ., USA., pp: 259-267.
Hemraj, S., M.B. Kumar and T.C. Panda, 2011. Extended honeypot framework to detect old/new cyber attacks. IJEST, 3: 2421-2426.
Jones, J.K. and G.W. Romney, 2004. Honeynets: An educational resource for I.T Security SIGITE. Salt Lake City, Utah.
Kruegel, C. and G. Vigna, 2003. Anomaly Detection of Web based Attacks. ACM Press, New York, USA., pp: 251-261.
Kruegel, C., T. Toth and E. Kirda, 2002. Service specification anomaly detection for network intrusion detection. Proceedings of the Symposium on Applied Computing, March 10-14, 2002, Madrid, Spain -.
Kumar, M.B. and J. Navnit, 2007. Fixed period of temporary immunity after run of anti malicious software on computer nodes. Applied Math. Comp., 190: 1207-1212.
Lopez, M.H. and C.F.L. Resendez, 2008. Honeypots: Basic concepts, classification and educational use as resource in information security and course. Proceedings of the Information Science and IT Education Conference, (IITEC'08), Mexico, pp: 69-76.
Marchese, M., R. Surlinelli and S. Zappatore, 2011. Monitoring unauthorized Internet access through honeypot system. Int. J. Commun. Syst., 24: 75-93.
Direct Link | Mokube, L. and M. Adams, 2007. Honeypot: Concepts, Approach and Challenge. ACMSE, Winston-Salem, North Carolina, USA, pp: 23-24.
Pouget, F. and T. Holz, 2005. A Pointillist Approach for Comparing Honeypot. In: Intrusion and Malware Vulnerability Assessment, Julisch, K. and C. Krugel (Eds.). Springer, Berlin/Heidelberg, Germany.
Pouzol, J.P. and P. Ducasse, 2002. Formal specification of intrusion signatures and detection rules. Proceedings of the 15th IEEE Workshop on Computer Security Foundations, June 24-26, 2002, Nova Scotia, Canada, pp: 64-.
Provos, N., 2004. A virtual honeypot framework. Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA., USA -.
Sommer, R. and V. Paxson, 2003. Enhancing byte-level network intrusion detection signatures with context. Proceedings of the 10th ACM Conference on Computer Communication Security, October 27-30, 2003, Washington, DC., USA., pp: 267-271.
Spitzmer, L., 2003. Open source honeypots: Learning with honeyd. http://www.net-security.org/news.php?id=1855.
Stoll, C., 2002. The Cuckoos' Egg: Tracking a Spy Through the Maze of Computer Espionage. 1st Edn., Pocket Books, New York, USA.
Tang, Y. and S. Chen, 2005. Defending against internet worms: A signature-based approach. Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 2, March 13-17, 2005, Miami, FL., USA., pp: 1384-1394.
Tang, Y. and S. Chen, 2010. Defending against Internet Worms: A Signature based Approach. Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL., USA., pp: 32611-32620.
Tirenin, W. and D. Fantz, 1999. A concept for strategic cyber defense. Proceedings of the Conference on Military Communication, Volume 1, October 31-November 3, 1999, Atlanta City, New Jersey, pp: 458-463.
Williamson, M.M. and J. Leveille, 2003. An epidemic logical model of virus spread and clean up. Hewlett-Packard Laboratories, Bristol. http://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf.
Yamoda, Y., T. Katoh, B.B. Bista and T. Takata, 2007. A new approach to early detection of an unknown worm. Proceedings of the 21st International Conference on Advance Information Networking and Application Workshops, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp: 194-198.
Ytiser, T., 1993. Polymorphic viruses: Implementation, detection and protection. VJDS, Advance Centre Research Group. http://ivanlef0u.fr/repo/madchat/vxdevl/vdat/pviripd.htm.