Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: IDS (Page 1 of 10)   1 2 3 4 5 6  Next >
Integrating More Intelligence into Your IDS, Part 2
SecurityFocus contributor Don Parker continues his discussion on how artificial intelligence is influencing intrusion detection system (IDS) development.
By: Don Parker and Ryan Wegner 2008-03-12
http://www.securityfocus.com/infocus/1899

Integrating More Intelligence into Your IDS, Part 1
SecurityFocus contributor Don Parker explore how artificial intelligence is influencing intrusion detection system (IDS) development, and in this first of two articles, shows examples using the popular Snort platform.
By: Don Parker and Ryan Wegner 2008-03-05
http://www.securityfocus.com/infocus/1898

Using Nepenthes Honeypots to Detect Common Malware
This article describes the use of Nepenthes, a low-interaction honeypot, as an additional layer of network defense. Nepenthes can be used to capture malware, alert an administrator about a network compromise, and assist in containing and removing the infection.
By: Jamie Riden 2006-11-07
http://www.securityfocus.com/infocus/1880

Sebek 3: tracking the attackers, part two
The second article in this honeypot series discusses best practices for deploying Sebek 3 inside a GenIII honepot, and shows how to patch Sebek to watch all the attacker's activities in real-time.
By: Raul Siles, GSE 2006-02-13
http://www.securityfocus.com/infocus/1858

Sebek 3: tracking the attackers, part one
The first of this two-part series will discuss what Sebek is and what makes it so interesting, first by looking at the new capabilities of version 3 and how it integrates with GenIII Honeynet infrastructures.
By: Raul Siles, GSE 2006-01-16
http://www.securityfocus.com/infocus/1855

Introduction to IPAudit
This article described the usefulness of IPAudit, a network took similar to Netflow that is used to discover botnets, compromised hosts, and other security issues on larger networks.
By: Paul Asadoorian 2005-07-11
http://www.securityfocus.com/infocus/1842

Defeating Honeypots: System Issues, Part 2
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
By: Thorsten Holz, Frederic Raynal 2005-04-06
http://www.securityfocus.com/infocus/1828

Defeating Honeypots: System Issues, Part 1
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
By: Thorsten Holz, Frederic Raynal 2005-03-23
http://www.securityfocus.com/infocus/1826

Issues Discovering Compromised Machines
This article discusses the discovery of compromised machines in large enterprise environments, and offers some suggestions on correlating NIDS and HIPS logs to avoid false positives.
By: Anton Chuvakin 2004-10-25
http://www.securityfocus.com/infocus/1808

Defeating Honeypots: Network Issues, Part 2
The purpose of this paper is to explain how attackers behave when they attempt to identify and defeat honeypots, and is useful information for security professionals who need to deploy honeypots in a more stealthy manner. Part 2 looks at Sebek-based honeypots, snort_inline, Fake AP, and Bait and Switch honeypots.
By: Laurent Oudot, Thorsten Holz 2004-10-07
http://www.securityfocus.com/infocus/1805

IDS (Page 1 of 10)   1 2 3 4 5 6  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus