<電子ブック>
Honeypots : a new paradigm to information security
責任表示 | |
---|---|
著者 | |
本文言語 | |
出版者 | |
出版年 | |
出版地 | |
目次 | Machine generated contents note: 1.Honeypots 1.1.Background 1.1.1.History and Evolution of Honeypots 1.2.Honeypots 1.2.1.Generic Honeypot Model 1.3.Honeypots vs. Firewalls and Intrusion Detection Systems 1.3.1.Firewalls 1.3.2.Intrusion Detection Systems 1.3.3.Honeypots 1.4.Classification of Honeypots 1.4.1.Based on Usage 1.4.2.Based on Level of Interaction 1.4.3.Based on Hardware Deployment Type 1.4.4.Based on Role of Honeypot 1.5.Placement of Honeypots 1.5.1.External Placement 1.5.2.Internal Placement 1.5.3.DMZ Placement 1.5.4.On the Whole 1.6.Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms 1.6.1.Honeytokens 1.6.2.Honeypages 1.6.3.Honeynets 1.6.4.Honeyfarms 1.7.Value of Honeypots' 1.7.1.Low False-Positives 1.7.2.Early Detection 1.7.3.New Threat Detection 1.7.4.Defense in Depth 1.7.5.Other Advantages of Honeypots 1.8.Risks and Tradeoffs 1.9.Key Issues and Challenges 1.10.Summary Exercises References 2.Commercially Available Honeypots 2.1.Back Officer Friendly 2.2.Specter 2.3.Mantrap 2.4.Honeyd 2.5.Summary Exercises References 3.Honeynets 3.1.Overview of Honeynets 3.2.Value of Honeynets 3.2.1.Methods, Motives, and Evolving Tools 3.2.2.Trend Analysis 3.2.3.Incident Response 3.2.4.Testbed 3.3.Working of Honeynet 3.3.1.Controlling Data 3.3.2.Capturing Data 3.3.3.Collecting Data 3.4.Honeynet Architectures 3.4.1.Gen I 3.4.2.Gen II 3.5.Sweetening the Honeynets 3.6.Risks Associated with Honeynets 3.7.Summary Exercises References 4.Attacks and Role of Honeypots 4.1.Phases of Attack and Honeypots 4.1.1.Prevention 4.1.2.Detection 4.1.3.Response 4.1.4.Research 4.2.Worms and Virus Attacks 4.2.1.Worms 4.2.2.Virus Attacks 4.3.Spam and Phishing Mails 4.3.1.Spams 4.3.2.Phishing 4.4.Distributed Denial of Service Attacks 4.5.Summary Exercises References 5.Static Honeypots 5.1.Honeypot as Detection Systems 5.1.1.Japonica: Objectives and Requirements 5.1.2.Framework and Components 5.2.Honeypot as Deception Systems 5.3.Summary Exercises References 6.Virtual Honeypots 6.1.Virtual Honeypot: VMware Workstation 6.2.Data Capture on Virtual Honeypots 6.3.Raw Disks and Virtual Disks 6.4.Virtual Honeynet 6.5.Case Study 6.6.Summary Exercises References 7.Dynamic Honeypots 7.1.Issues with Static Honeypots 7.2.Dynamic Honeypots 7.3.Dynamic Honeypot Design 7.3.1.Proposed Design Overview 7.3.2.Active Probing 7.3.3.Passive Fingerprinting 7.3.4.Honeyd 7.3.5.The Database 7.3.6.Dynamic Honeypot Engine 7.4.Dynamic Honeypot Construction 7.4.1.Graphic User Interface 7.5.Benefits 7.6.Summary Exercises References 8.Wireless Honeypots 8.1.Introduction to Wireless Local Area Networks 8.2.Basic Wireless Concepts 8.2.1.Stations and APs 8.2.2.Infrastructure and Ad Hoc Modes 8.2.3.Frames 8.2.4.Authentication 8.2.5.Association 8.3.802.11 Security 8.3.1.Access Control List 8.3.2.WEP (Wired Equivalent Privacy) 8.3.3.WPA (Wi-Fi Protected Access) 8.3.4.802.11i 8.4.Wireless Attacks: From A Blackhat's Perspective 8.4.1.Passive Attacks on Wireless Networks 8.4.2.Active Attacks on Wireless Networks 8.4.3.Man-in-the-Middle Attacks on Wireless Networks 8.4.4.Jamming Attacks on Wireless Networks 8.4.5.Some other Attacks 8.5.Wireless Honeypots 8.5.1.Needs and Goals of Wireless Honeypots 8.5.2.Wireless Honeypot History 8.5.3.Theory and Design 8.5.4.Wireless Activity 8.5.5.Wireless Architectures 8.5.6.Some Practical examples to create Honeypots 8.5.7.Existing Wireless Architectures on Wireless Honeypots 8.5.8.Wireless Tools 8.5.9.Wireless Honeypot using Wired Tools 8.6.Limitations 8.7.Summary Exercises References 9.Applications of Honeypots 9.1.Defense against Automated Attacks 9.2.Protection against Human Intruders 9.3.Surgical Detection Methods 9.4.Cyber-Forensics 9.5.Network Surveillance 9.6.Forensic Analysis 9.7.Tactical Battlefield 9.8.Use as Deterrent 9.9.Research Purpose 9.10.Summary Exercises References 10.Anti-Honeypot Technology 10.1.Network Issues 10.1.1.Honeypot and Fingerprinting: Practical Examples 10.2.System Issues 10.3.Techniques For Honeypot Detection 10.3.1.Honeypot Hunters 10.3.2.Honeypot Detection in Advanced Botnet Attacks 10.3.3.Mapping Internet Sensors With Probe Response Attacks 10.4.Countermeasure for Detection of Honeypot Deployment 10.4.1.The Honeyanole System 10.4.2.A Hybrid Honeypot Architecture for Scalable Network Monitoring 10.5.Summary Exercises References 11.Honeypots and Network Forensics 11.1.Network Forensics 11.1.1.Classification of Network Forensics Systems 11.1.2.Motivation for Network Forensics 11.1.3.Honeypot approaches for Network Forensics 11.2.Honeypot as Network Forensic Analysis Tools 11.3.Honeypot Based Network Forensics Frameworks 11.3.1.Generic Process Model 11.3.2.Honeypot Based Frameworks for Forensics 11.4.Summary Exercises References.続きを見る |
アクセス注記 | Taylor & Francis eBooks DRM Free Collection トライアル中(2023/3/31まで利用可能) 【Trial】This title is available until March 31, 2023. |
本文を見る | Taylor & Francis eBooks DRM Free Collection: 2011 |
詳細
レコードID | |
---|---|
刊行頻度 | |
データベース タイトル | |
主題 | |
管理番号 | |
eISBN | |
XISBN | |
登録日 | 2023.01.20 |
更新日 | 2023.01.20 |