Scalability, fidelity, and containment in the potemkin virtual honeyfarm
- 20 October 2005
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 39 (5) , 148-162
- https://doi.org/10.1145/1095810.1095825
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Detecting past and present intrusions through vulnerability-specific predicatesPublished by Association for Computing Machinery (ACM) ,2005
- ACTPublished by Association for Computing Machinery (ACM) ,2004
- Characteristics of internet background radiationPublished by Association for Computing Machinery (ACM) ,2004
- On the Design and Use of Internet Sinks for Network Abuse MonitoringPublished by Springer Nature ,2004
- HoneyStat: Local Worm Detection Using HoneypotsPublished by Springer Nature ,2004
- Detection of injected, dynamically generated, and obfuscated malicious codePublished by Association for Computing Machinery (ACM) ,2003
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Inside the Slammer wormIEEE Security & Privacy, 2003
- Code-RedPublished by Association for Computing Machinery (ACM) ,2002
- The click modular routerACM Transactions on Computer Systems, 2000