<電子ブック>
Honeypots : a new paradigm to information security

責任表示
著者
本文言語
出版者
出版年
出版地
目次 Machine generated contents note: 1.Honeypots
1.1.Background
1.1.1.History and Evolution of Honeypots
1.2.Honeypots
1.2.1.Generic Honeypot Model
1.3.Honeypots vs. Firewalls and Intrusion Detection Systems
1.3.1.Firewalls
1.3.2.Intrusion Detection Systems
1.3.3.Honeypots
1.4.Classification of Honeypots
1.4.1.Based on Usage
1.4.2.Based on Level of Interaction
1.4.3.Based on Hardware Deployment Type
1.4.4.Based on Role of Honeypot
1.5.Placement of Honeypots
1.5.1.External Placement
1.5.2.Internal Placement
1.5.3.DMZ Placement
1.5.4.On the Whole
1.6.Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms
1.6.1.Honeytokens
1.6.2.Honeypages
1.6.3.Honeynets
1.6.4.Honeyfarms
1.7.Value of Honeypots'
1.7.1.Low False-Positives
1.7.2.Early Detection
1.7.3.New Threat Detection
1.7.4.Defense in Depth
1.7.5.Other Advantages of Honeypots
1.8.Risks and Tradeoffs
1.9.Key Issues and Challenges
1.10.Summary
Exercises
References
2.Commercially Available Honeypots
2.1.Back Officer Friendly
2.2.Specter
2.3.Mantrap
2.4.Honeyd
2.5.Summary
Exercises
References
3.Honeynets
3.1.Overview of Honeynets
3.2.Value of Honeynets
3.2.1.Methods, Motives, and Evolving Tools
3.2.2.Trend Analysis
3.2.3.Incident Response
3.2.4.Testbed
3.3.Working of Honeynet
3.3.1.Controlling Data
3.3.2.Capturing Data
3.3.3.Collecting Data
3.4.Honeynet Architectures
3.4.1.Gen I
3.4.2.Gen II
3.5.Sweetening the Honeynets
3.6.Risks Associated with Honeynets
3.7.Summary
Exercises
References
4.Attacks and Role of Honeypots
4.1.Phases of Attack and Honeypots
4.1.1.Prevention
4.1.2.Detection
4.1.3.Response
4.1.4.Research
4.2.Worms and Virus Attacks
4.2.1.Worms
4.2.2.Virus Attacks
4.3.Spam and Phishing Mails
4.3.1.Spams
4.3.2.Phishing
4.4.Distributed Denial of Service Attacks
4.5.Summary
Exercises
References
5.Static Honeypots
5.1.Honeypot as Detection Systems
5.1.1.Japonica: Objectives and Requirements
5.1.2.Framework and Components
5.2.Honeypot as Deception Systems
5.3.Summary
Exercises
References
6.Virtual Honeypots
6.1.Virtual Honeypot: VMware Workstation
6.2.Data Capture on Virtual Honeypots
6.3.Raw Disks and Virtual Disks
6.4.Virtual Honeynet
6.5.Case Study
6.6.Summary
Exercises
References
7.Dynamic Honeypots
7.1.Issues with Static Honeypots
7.2.Dynamic Honeypots
7.3.Dynamic Honeypot Design
7.3.1.Proposed Design Overview
7.3.2.Active Probing
7.3.3.Passive Fingerprinting
7.3.4.Honeyd
7.3.5.The Database
7.3.6.Dynamic Honeypot Engine
7.4.Dynamic Honeypot Construction
7.4.1.Graphic User Interface
7.5.Benefits
7.6.Summary
Exercises
References
8.Wireless Honeypots
8.1.Introduction to Wireless Local Area Networks
8.2.Basic Wireless Concepts
8.2.1.Stations and APs
8.2.2.Infrastructure and Ad Hoc Modes
8.2.3.Frames
8.2.4.Authentication
8.2.5.Association
8.3.802.11 Security
8.3.1.Access Control List
8.3.2.WEP (Wired Equivalent Privacy)
8.3.3.WPA (Wi-Fi Protected Access)
8.3.4.802.11i
8.4.Wireless Attacks: From A Blackhat's Perspective
8.4.1.Passive Attacks on Wireless Networks
8.4.2.Active Attacks on Wireless Networks
8.4.3.Man-in-the-Middle Attacks on Wireless Networks
8.4.4.Jamming Attacks on Wireless Networks
8.4.5.Some other Attacks
8.5.Wireless Honeypots
8.5.1.Needs and Goals of Wireless Honeypots
8.5.2.Wireless Honeypot History
8.5.3.Theory and Design
8.5.4.Wireless Activity
8.5.5.Wireless Architectures
8.5.6.Some Practical examples to create Honeypots
8.5.7.Existing Wireless Architectures on Wireless Honeypots
8.5.8.Wireless Tools
8.5.9.Wireless Honeypot using Wired Tools
8.6.Limitations
8.7.Summary
Exercises
References
9.Applications of Honeypots
9.1.Defense against Automated Attacks
9.2.Protection against Human Intruders
9.3.Surgical Detection Methods
9.4.Cyber-Forensics
9.5.Network Surveillance
9.6.Forensic Analysis
9.7.Tactical Battlefield
9.8.Use as Deterrent
9.9.Research Purpose
9.10.Summary
Exercises
References
10.Anti-Honeypot Technology
10.1.Network Issues
10.1.1.Honeypot and Fingerprinting: Practical Examples
10.2.System Issues
10.3.Techniques For Honeypot Detection
10.3.1.Honeypot Hunters
10.3.2.Honeypot Detection in Advanced Botnet Attacks
10.3.3.Mapping Internet Sensors With Probe Response Attacks
10.4.Countermeasure for Detection of Honeypot Deployment
10.4.1.The Honeyanole System
10.4.2.A Hybrid Honeypot Architecture for Scalable Network Monitoring
10.5.Summary
Exercises
References
11.Honeypots and Network Forensics
11.1.Network Forensics
11.1.1.Classification of Network Forensics Systems
11.1.2.Motivation for Network Forensics
11.1.3.Honeypot approaches for Network Forensics
11.2.Honeypot as Network Forensic Analysis Tools
11.3.Honeypot Based Network Forensics Frameworks
11.3.1.Generic Process Model
11.3.2.Honeypot Based Frameworks for Forensics
11.4.Summary
Exercises
References.
続きを見る
アクセス注記 Taylor & Francis eBooks DRM Free Collection トライアル中(2023/3/31まで利用可能) 【Trial】This title is available until March 31, 2023.
本文を見る Taylor & Francis eBooks DRM Free Collection: 2011

詳細

レコードID
刊行頻度
データベース タイトル
主題
管理番号
eISBN
XISBN
登録日 2023.01.20
更新日 2023.01.20