Matches in Library of Congress for { <http://lccn.loc.gov/2010051278> ?p ?o. }
Showing items 1 to 25 of
25
with 100 items per page.
- 2010051278 contributor B11798207.
- 2010051278 contributor B11798208.
- 2010051278 created "c2011.".
- 2010051278 date "2011".
- 2010051278 date "c2011.".
- 2010051278 dateCopyrighted "c2011.".
- 2010051278 description "Includes bibliographical references and index.".
- 2010051278 description "Machine generated contents note: 1.Honeypots -- 1.1.Background -- 1.1.1.History and Evolution of Honeypots -- 1.2.Honeypots -- 1.2.1.Generic Honeypot Model -- 1.3.Honeypots vs. Firewalls and Intrusion Detection Systems -- 1.3.1.Firewalls -- 1.3.2.Intrusion Detection Systems -- 1.3.3.Honeypots -- 1.4.Classification of Honeypots -- 1.4.1.Based on Usage -- 1.4.2.Based on Level of Interaction -- 1.4.3.Based on Hardware Deployment Type -- 1.4.4.Based on Role of Honeypot -- 1.5.Placement of Honeypots -- 1.5.1.External Placement -- 1.5.2.Internal Placement -- 1.5.3.DMZ Placement -- 1.5.4.On the Whole -- 1.6.Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms -- 1.6.1.Honeytokens -- 1.6.2.Honeypages -- 1.6.3.Honeynets -- 1.6.4.Honeyfarms -- 1.7.Value of Honeypots' -- 1.7.1.Low False-Positives -- 1.7.2.Early Detection -- 1.7.3.New Threat Detection -- 1.7.4.Defense in Depth -- 1.7.5.Other Advantages of Honeypots -- 1.8.Risks and Tradeoffs -- 1.9.Key Issues and Challenges -- 1.10.Summary -- Exercises -- References -- 2.Commercially Available Honeypots -- 2.1.Back Officer Friendly -- 2.2.Specter -- 2.3.Mantrap -- 2.4.Honeyd -- 2.5.Summary -- Exercises -- References -- 3.Honeynets -- 3.1.Overview of Honeynets -- 3.2.Value of Honeynets -- 3.2.1.Methods, Motives, and Evolving Tools -- 3.2.2.Trend Analysis -- 3.2.3.Incident Response -- 3.2.4.Testbed -- 3.3.Working of Honeynet -- 3.3.1.Controlling Data -- 3.3.2.Capturing Data -- 3.3.3.Collecting Data -- 3.4.Honeynet Architectures -- 3.4.1.Gen I -- 3.4.2.Gen II -- 3.5.Sweetening the Honeynets -- 3.6.Risks Associated with Honeynets -- 3.7.Summary -- Exercises -- References -- 4.Attacks and Role of Honeypots -- 4.1.Phases of Attack and Honeypots -- 4.1.1.Prevention -- 4.1.2.Detection -- 4.1.3.Response -- 4.1.4.Research -- 4.2.Worms and Virus Attacks -- 4.2.1.Worms -- 4.2.2.Virus Attacks -- 4.3.Spam and Phishing Mails -- 4.3.1.Spams -- 4.3.2.Phishing -- 4.4.Distributed Denial of Service Attacks -- 4.5.Summary -- Exercises -- References -- 5.Static Honeypots -- 5.1.Honeypot as Detection Systems -- 5.1.1.Japonica: Objectives and Requirements -- 5.1.2.Framework and Components -- 5.2.Honeypot as Deception Systems -- 5.3.Summary -- Exercises -- References -- 6.Virtual Honeypots -- 6.1.Virtual Honeypot: VMware Workstation -- 6.2.Data Capture on Virtual Honeypots -- 6.3.Raw Disks and Virtual Disks -- 6.4.Virtual Honeynet -- 6.5.Case Study -- 6.6.Summary -- Exercises -- References -- 7.Dynamic Honeypots -- 7.1.Issues with Static Honeypots -- 7.2.Dynamic Honeypots -- 7.3.Dynamic Honeypot Design -- 7.3.1.Proposed Design Overview -- 7.3.2.Active Probing -- 7.3.3.Passive Fingerprinting -- 7.3.4.Honeyd -- 7.3.5.The Database -- 7.3.6.Dynamic Honeypot Engine -- 7.4.Dynamic Honeypot Construction -- 7.4.1.Graphic User Interface -- 7.5.Benefits -- 7.6.Summary -- Exercises -- References -- 8.Wireless Honeypots -- 8.1.Introduction to Wireless Local Area Networks -- 8.2.Basic Wireless Concepts -- 8.2.1.Stations and APs -- 8.2.2.Infrastructure and Ad Hoc Modes -- 8.2.3.Frames -- 8.2.4.Authentication -- 8.2.5.Association -- 8.3.802.11 Security -- 8.3.1.Access Control List -- 8.3.2.WEP (Wired Equivalent Privacy) -- 8.3.3.WPA (Wi-Fi Protected Access) -- 8.3.4.802.11i -- 8.4.Wireless Attacks: From A Blackhat's Perspective -- 8.4.1.Passive Attacks on Wireless Networks -- 8.4.2.Active Attacks on Wireless Networks -- 8.4.3.Man-in-the-Middle Attacks on Wireless Networks -- 8.4.4.Jamming Attacks on Wireless Networks -- 8.4.5.Some other Attacks -- 8.5.Wireless Honeypots -- 8.5.1.Needs and Goals of Wireless Honeypots -- 8.5.2.Wireless Honeypot History -- 8.5.3.Theory and Design -- 8.5.4.Wireless Activity -- 8.5.5.Wireless Architectures -- 8.5.6.Some Practical examples to create Honeypots -- 8.5.7.Existing Wireless Architectures on Wireless Honeypots -- 8.5.8.Wireless Tools -- 8.5.9.Wireless Honeypot using Wired Tools -- 8.6.Limitations -- 8.7.Summary -- Exercises -- References -- 9.Applications of Honeypots -- 9.1.Defense against Automated Attacks -- 9.2.Protection against Human Intruders -- 9.3.Surgical Detection Methods -- 9.4.Cyber-Forensics -- 9.5.Network Surveillance -- 9.6.Forensic Analysis -- 9.7.Tactical Battlefield -- 9.8.Use as Deterrent -- 9.9.Research Purpose -- 9.10.Summary -- Exercises -- References -- 10.Anti-Honeypot Technology -- 10.1.Network Issues -- 10.1.1.Honeypot and Fingerprinting: Practical Examples -- 10.2.System Issues -- 10.3.Techniques For Honeypot Detection -- 10.3.1.Honeypot Hunters -- 10.3.2.Honeypot Detection in Advanced Botnet Attacks -- 10.3.3.Mapping Internet Sensors With Probe Response Attacks -- 10.4.Countermeasure for Detection of Honeypot Deployment -- 10.4.1.The Honeyanole System -- 10.4.2.A Hybrid Honeypot Architecture for Scalable Network Monitoring -- 10.5.Summary -- Exercises -- References -- 11.Honeypots and Network Forensics -- 11.1.Network Forensics -- 11.1.1.Classification of Network Forensics Systems -- 11.1.2.Motivation for Network Forensics -- 11.1.3.Honeypot approaches for Network Forensics -- 11.2.Honeypot as Network Forensic Analysis Tools -- 11.3.Honeypot Based Network Forensics Frameworks -- 11.3.1.Generic Process Model -- 11.3.2.Honeypot Based Frameworks for Forensics -- 11.4.Summary -- Exercises -- References.".
- 2010051278 extent "xiv, 328 p. :".
- 2010051278 identifier "1578087082".
- 2010051278 identifier "9781578087082".
- 2010051278 issued "2011".
- 2010051278 issued "c2011.".
- 2010051278 language "eng".
- 2010051278 publisher "Enfield, N.H. : Science Publishers ; Boca Raton, FL : Distributed by CRC Press,".
- 2010051278 subject "005.8 22".
- 2010051278 subject "Computer hackers.".
- 2010051278 subject "Computer networks Security measures.".
- 2010051278 subject "Computer security.".
- 2010051278 subject "Firewalls (Computer security)".
- 2010051278 subject "QA76.9.A25 J66 2011".
- 2010051278 subject "Wireless communication systems Security measures.".
- 2010051278 tableOfContents "Machine generated contents note: 1.Honeypots -- 1.1.Background -- 1.1.1.History and Evolution of Honeypots -- 1.2.Honeypots -- 1.2.1.Generic Honeypot Model -- 1.3.Honeypots vs. Firewalls and Intrusion Detection Systems -- 1.3.1.Firewalls -- 1.3.2.Intrusion Detection Systems -- 1.3.3.Honeypots -- 1.4.Classification of Honeypots -- 1.4.1.Based on Usage -- 1.4.2.Based on Level of Interaction -- 1.4.3.Based on Hardware Deployment Type -- 1.4.4.Based on Role of Honeypot -- 1.5.Placement of Honeypots -- 1.5.1.External Placement -- 1.5.2.Internal Placement -- 1.5.3.DMZ Placement -- 1.5.4.On the Whole -- 1.6.Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms -- 1.6.1.Honeytokens -- 1.6.2.Honeypages -- 1.6.3.Honeynets -- 1.6.4.Honeyfarms -- 1.7.Value of Honeypots' -- 1.7.1.Low False-Positives -- 1.7.2.Early Detection -- 1.7.3.New Threat Detection -- 1.7.4.Defense in Depth -- 1.7.5.Other Advantages of Honeypots -- 1.8.Risks and Tradeoffs -- 1.9.Key Issues and Challenges -- 1.10.Summary -- Exercises -- References -- 2.Commercially Available Honeypots -- 2.1.Back Officer Friendly -- 2.2.Specter -- 2.3.Mantrap -- 2.4.Honeyd -- 2.5.Summary -- Exercises -- References -- 3.Honeynets -- 3.1.Overview of Honeynets -- 3.2.Value of Honeynets -- 3.2.1.Methods, Motives, and Evolving Tools -- 3.2.2.Trend Analysis -- 3.2.3.Incident Response -- 3.2.4.Testbed -- 3.3.Working of Honeynet -- 3.3.1.Controlling Data -- 3.3.2.Capturing Data -- 3.3.3.Collecting Data -- 3.4.Honeynet Architectures -- 3.4.1.Gen I -- 3.4.2.Gen II -- 3.5.Sweetening the Honeynets -- 3.6.Risks Associated with Honeynets -- 3.7.Summary -- Exercises -- References -- 4.Attacks and Role of Honeypots -- 4.1.Phases of Attack and Honeypots -- 4.1.1.Prevention -- 4.1.2.Detection -- 4.1.3.Response -- 4.1.4.Research -- 4.2.Worms and Virus Attacks -- 4.2.1.Worms -- 4.2.2.Virus Attacks -- 4.3.Spam and Phishing Mails -- 4.3.1.Spams -- 4.3.2.Phishing -- 4.4.Distributed Denial of Service Attacks -- 4.5.Summary -- Exercises -- References -- 5.Static Honeypots -- 5.1.Honeypot as Detection Systems -- 5.1.1.Japonica: Objectives and Requirements -- 5.1.2.Framework and Components -- 5.2.Honeypot as Deception Systems -- 5.3.Summary -- Exercises -- References -- 6.Virtual Honeypots -- 6.1.Virtual Honeypot: VMware Workstation -- 6.2.Data Capture on Virtual Honeypots -- 6.3.Raw Disks and Virtual Disks -- 6.4.Virtual Honeynet -- 6.5.Case Study -- 6.6.Summary -- Exercises -- References -- 7.Dynamic Honeypots -- 7.1.Issues with Static Honeypots -- 7.2.Dynamic Honeypots -- 7.3.Dynamic Honeypot Design -- 7.3.1.Proposed Design Overview -- 7.3.2.Active Probing -- 7.3.3.Passive Fingerprinting -- 7.3.4.Honeyd -- 7.3.5.The Database -- 7.3.6.Dynamic Honeypot Engine -- 7.4.Dynamic Honeypot Construction -- 7.4.1.Graphic User Interface -- 7.5.Benefits -- 7.6.Summary -- Exercises -- References -- 8.Wireless Honeypots -- 8.1.Introduction to Wireless Local Area Networks -- 8.2.Basic Wireless Concepts -- 8.2.1.Stations and APs -- 8.2.2.Infrastructure and Ad Hoc Modes -- 8.2.3.Frames -- 8.2.4.Authentication -- 8.2.5.Association -- 8.3.802.11 Security -- 8.3.1.Access Control List -- 8.3.2.WEP (Wired Equivalent Privacy) -- 8.3.3.WPA (Wi-Fi Protected Access) -- 8.3.4.802.11i -- 8.4.Wireless Attacks: From A Blackhat's Perspective -- 8.4.1.Passive Attacks on Wireless Networks -- 8.4.2.Active Attacks on Wireless Networks -- 8.4.3.Man-in-the-Middle Attacks on Wireless Networks -- 8.4.4.Jamming Attacks on Wireless Networks -- 8.4.5.Some other Attacks -- 8.5.Wireless Honeypots -- 8.5.1.Needs and Goals of Wireless Honeypots -- 8.5.2.Wireless Honeypot History -- 8.5.3.Theory and Design -- 8.5.4.Wireless Activity -- 8.5.5.Wireless Architectures -- 8.5.6.Some Practical examples to create Honeypots -- 8.5.7.Existing Wireless Architectures on Wireless Honeypots -- 8.5.8.Wireless Tools -- 8.5.9.Wireless Honeypot using Wired Tools -- 8.6.Limitations -- 8.7.Summary -- Exercises -- References -- 9.Applications of Honeypots -- 9.1.Defense against Automated Attacks -- 9.2.Protection against Human Intruders -- 9.3.Surgical Detection Methods -- 9.4.Cyber-Forensics -- 9.5.Network Surveillance -- 9.6.Forensic Analysis -- 9.7.Tactical Battlefield -- 9.8.Use as Deterrent -- 9.9.Research Purpose -- 9.10.Summary -- Exercises -- References -- 10.Anti-Honeypot Technology -- 10.1.Network Issues -- 10.1.1.Honeypot and Fingerprinting: Practical Examples -- 10.2.System Issues -- 10.3.Techniques For Honeypot Detection -- 10.3.1.Honeypot Hunters -- 10.3.2.Honeypot Detection in Advanced Botnet Attacks -- 10.3.3.Mapping Internet Sensors With Probe Response Attacks -- 10.4.Countermeasure for Detection of Honeypot Deployment -- 10.4.1.The Honeyanole System -- 10.4.2.A Hybrid Honeypot Architecture for Scalable Network Monitoring -- 10.5.Summary -- Exercises -- References -- 11.Honeypots and Network Forensics -- 11.1.Network Forensics -- 11.1.1.Classification of Network Forensics Systems -- 11.1.2.Motivation for Network Forensics -- 11.1.3.Honeypot approaches for Network Forensics -- 11.2.Honeypot as Network Forensic Analysis Tools -- 11.3.Honeypot Based Network Forensics Frameworks -- 11.3.1.Generic Process Model -- 11.3.2.Honeypot Based Frameworks for Forensics -- 11.4.Summary -- Exercises -- References.".
- 2010051278 title "Honeypots : a new paradigm to information security / R.C. Joshi, Anjali Sardana.".
- 2010051278 type "text".