Voir la notice de l'article provenant de la source Math-Net.Ru
@article{VSGTU_2013_4_a9, author = {Yu. V. Aleinov and I. N. Saushkin}, title = {Optimal honeynet configuration in enterprise computer networks}, journal = {Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences}, pages = {107--114}, publisher = {mathdoc}, number = {4}, year = {2013}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/} }
TY - JOUR AU - Yu. V. Aleinov AU - I. N. Saushkin TI - Optimal honeynet configuration in enterprise computer networks JO - Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences PY - 2013 SP - 107 EP - 114 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/ LA - ru ID - VSGTU_2013_4_a9 ER -
%0 Journal Article %A Yu. V. Aleinov %A I. N. Saushkin %T Optimal honeynet configuration in enterprise computer networks %J Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences %D 2013 %P 107-114 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/ %G ru %F VSGTU_2013_4_a9
Yu. V. Aleinov; I. N. Saushkin. Optimal honeynet configuration in enterprise computer networks. Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences, no. 4 (2013), pp. 107-114. http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/
[1] A. V. Lukatcky, Attack detection, BHV—Petersburg, St. Petersburg, 2001, 624 pp.
[2] L. Spitzner, Honeypot. Tracking Hackers, Addison-Wesley, Boston, 2003, 429 pp.
[3] I. V. Kotenko, M. V. Stepashkin, “Deception systems for protection of information resources in computer networks”, Tr. SPIIRAN, 2:1 (2004), 211–230
[4] C. Döring, Improving network security with honeypots. Honeypot project, Master's thesis, University of Applied Sciences Darmstadt, Darmstadt, 2005, 123 pp.
[5] C. Hecker, K. L. Nance, B. Hay, “Dynamic Honeypot Construction”, Proc. of the 10th Colloquium for Information Systems Security Education, University of Maryland, University College, Adelphi, MD, 2006, 95–102
[6] I. Kuwatly, M. Sraj, Z. A. Masri, H. Artail, “A Dynamic Honeypot Design for Intrusion Detection”, 2004 IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004, 95–104 | DOI
[7] Yu. V. Aleinov, “The principles of construction of model Honeypot systems”, Polzunovskiy vestnik, 2012, no. 3/2, 36–39
[8] I. D. Medvedkovsky, P. V. Sem'yanov, D. G. Leonov, A. V. Lukatsky, Attack from Internet, SOLON-R, Moscow, 2002, 368 pp.