사용되지 않는 포트를 이용하여 해커를 허니팟으로 리다이렉트하는 시스템 설계 및 구현
Vol. 16, No. 5, pp. 15-24,
10월.
2006
10.13089/JKIISC.2006.16.5.15, Full Text:
Keywords: computer security, signature, Honeypot, Intrusion
Abstract Statistics
Cite this article
10.13089/JKIISC.2006.16.5.15, Full Text:
Keywords: computer security, signature, Honeypot, Intrusion
Abstract Statistics
Cite this article
[IEEE Style]
I. Kim and M. Kim, "Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots," Journal of The Korea Institute of Information Security and Cryptology, vol. 16, no. 5, pp. 15-24, 2006. DOI: 10.13089/JKIISC.2006.16.5.15.
[ACM Style]
Ik-Su Kim and Myung-Ho Kim. 2006. Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots. Journal of The Korea Institute of Information Security and Cryptology, 16, 5, (2006), 15-24. DOI: 10.13089/JKIISC.2006.16.5.15.