International Journal of Soft Computing

Year: 2012
Volume: 7
Issue: 3
Page No. 131 - 134

Double-Sticky-Honeynet for Defending Viruses in Computer Network

Authors : Upendra Kumar, Bimal Kumar Mishrav and G. Sahoo

References

Cheswick, W., 1997. An Evening with Berferd. In: Internet be Sized: Countering Internet Scuffles, Denning, D.E. and P.J. Denning (Eds.). ACM Press/Addison Wesley, New York, USA., pp: 103-117.

Cohen, F., 1987. Computer viruses: Theory and experiments. Comput. Security, 6: 22-35.
CrossRef  |  Direct Link  |  

Ghose, A.K., J. Kanken and F. Charon, 1998. Detecting anomalous and unknown intrusions against programs. Proceedings of the 14th Annual Computer Security Applications Conference, December 7-11, 1998, Phoenix, AZ., USA., pp: 259-267.

Hemraj, S., M.B. Kumar and T.C. Panda, 2011. Extended honeypot framework to detect old/new cyber attacks. IJEST, 3: 2421-2426.

Jones, J.K. and G.W. Romney, 2004. Honeynets: An educational resource for I.T Security SIGITE. Salt Lake City, Utah.

Kruegel, C. and G. Vigna, 2003. Anomaly Detection of Web based Attacks. ACM Press, New York, USA., pp: 251-261.

Kruegel, C., T. Toth and E. Kirda, 2002. Service specification anomaly detection for network intrusion detection. Proceedings of the Symposium on Applied Computing, March 10-14, 2002, Madrid, Spain -.

Kumar, M.B. and J. Navnit, 2007. Fixed period of temporary immunity after run of anti malicious software on computer nodes. Applied Math. Comp., 190: 1207-1212.

Lopez, M.H. and C.F.L. Resendez, 2008. Honeypots: Basic concepts, classification and educational use as resource in information security and course. Proceedings of the Information Science and IT Education Conference, (IITEC'08), Mexico, pp: 69-76.

Marchese, M., R. Surlinelli and S. Zappatore, 2011. Monitoring unauthorized Internet access through honeypot system. Int. J. Commun. Syst., 24: 75-93.
Direct Link  |  

Mokube, L. and M. Adams, 2007. Honeypot: Concepts, Approach and Challenge. ACMSE, Winston-Salem, North Carolina, USA, pp: 23-24.

Pouget, F. and T. Holz, 2005. A Pointillist Approach for Comparing Honeypot. In: Intrusion and Malware Vulnerability Assessment, Julisch, K. and C. Krugel (Eds.). Springer, Berlin/Heidelberg, Germany.

Pouzol, J.P. and P. Ducasse, 2002. Formal specification of intrusion signatures and detection rules. Proceedings of the 15th IEEE Workshop on Computer Security Foundations, June 24-26, 2002, Nova Scotia, Canada, pp: 64-.

Provos, N., 2004. A virtual honeypot framework. Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA., USA -.

Sommer, R. and V. Paxson, 2003. Enhancing byte-level network intrusion detection signatures with context. Proceedings of the 10th ACM Conference on Computer Communication Security, October 27-30, 2003, Washington, DC., USA., pp: 267-271.

Spitzmer, L., 2003. Open source honeypots: Learning with honeyd. http://www.net-security.org/news.php?id=1855.

Stoll, C., 2002. The Cuckoos' Egg: Tracking a Spy Through the Maze of Computer Espionage. 1st Edn., Pocket Books, New York, USA.

Tang, Y. and S. Chen, 2005. Defending against internet worms: A signature-based approach. Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 2, March 13-17, 2005, Miami, FL., USA., pp: 1384-1394.

Tang, Y. and S. Chen, 2010. Defending against Internet Worms: A Signature based Approach. Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL., USA., pp: 32611-32620.

Tirenin, W. and D. Fantz, 1999. A concept for strategic cyber defense. Proceedings of the Conference on Military Communication, Volume 1, October 31-November 3, 1999, Atlanta City, New Jersey, pp: 458-463.

Williamson, M.M. and J. Leveille, 2003. An epidemic logical model of virus spread and clean up. Hewlett-Packard Laboratories, Bristol. http://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf.

Yamoda, Y., T. Katoh, B.B. Bista and T. Takata, 2007. A new approach to early detection of an unknown worm. Proceedings of the 21st International Conference on Advance Information Networking and Application Workshops, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp: 194-198.

Ytiser, T., 1993. Polymorphic viruses: Implementation, detection and protection. VJDS, Advance Centre Research Group. http://ivanlef0u.fr/repo/madchat/vxdevl/vdat/pviripd.htm.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved