- home
- Advanced Search
Filters
Access
Type
Year range
-chevron_right GO- This year
- Last 5 years
- Last 10 years
Field of Science
Funder
Country
Source
Research community
Organization
- Energy Research
- Energy Research
description Publicationkeyboard_double_arrow_right Part of book or chapter of book , Conference object , Other literature type 2015 SpainPublisher:Springer International Publishing Funded by:WTWTAuthors: Fan, Wenjun; Fernández, David; Du, Zhihui;Honeypots have been largely employed to help securing computer systems and capture malicious activities. At present, virtual honeynets -network scenarios made of virtual honeypots- are frequently used to investigate the adversary’s behaviour. The static deploying scheme used traditionally, in which the configuration of the honeynet is determined by security experts beforehand, lacks the capability of dynamically adapting its configuration after deployment. In this paper, a new adaptive and flexible virtual honeynet management system is proposed that dynamically creates, configures and deploys both low-interaction and high-interaction honeypots, emulating multiple operating systems. The results and measurements of the experiments carried out illustrate that new virtual honeynet system is more capable than previous virtual honeynet architectures.
Recolector de Cienci... arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAConference object . 2015License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAhttps://doi.org/10.1007/978-3-...Part of book or chapter of book . 2015 . Peer-reviewedLicense: Springer TDMData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-25744-0_1&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu8 citations 8 popularity Average influence Top 10% impulse Average Powered by BIP!
more_vert Recolector de Cienci... arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAConference object . 2015License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAhttps://doi.org/10.1007/978-3-...Part of book or chapter of book . 2015 . Peer-reviewedLicense: Springer TDMData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-25744-0_1&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
description Publicationkeyboard_double_arrow_right Part of book or chapter of book , Conference object , Other literature type 2015 SpainPublisher:Springer International Publishing Funded by:WTWTAuthors: Fan, Wenjun; Fernández, David; Du, Zhihui;Honeypots have been largely employed to help securing computer systems and capture malicious activities. At present, virtual honeynets -network scenarios made of virtual honeypots- are frequently used to investigate the adversary’s behaviour. The static deploying scheme used traditionally, in which the configuration of the honeynet is determined by security experts beforehand, lacks the capability of dynamically adapting its configuration after deployment. In this paper, a new adaptive and flexible virtual honeynet management system is proposed that dynamically creates, configures and deploys both low-interaction and high-interaction honeypots, emulating multiple operating systems. The results and measurements of the experiments carried out illustrate that new virtual honeynet system is more capable than previous virtual honeynet architectures.
Recolector de Cienci... arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAConference object . 2015License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAhttps://doi.org/10.1007/978-3-...Part of book or chapter of book . 2015 . Peer-reviewedLicense: Springer TDMData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-25744-0_1&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu8 citations 8 popularity Average influence Top 10% impulse Average Powered by BIP!
more_vert Recolector de Cienci... arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAConference object . 2015License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAhttps://doi.org/10.1007/978-3-...Part of book or chapter of book . 2015 . Peer-reviewedLicense: Springer TDMData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-25744-0_1&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu