|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Fighting Internet Worms With HoneypotsThis paper will evaluate the usefulness of using honeypots to fight Internet worms, including a discussion on capturing a worm, redirecting worm traffic to fake services, launching counter attacks to clean infected hosts, and finally removing the worm or negating its effects. 2003-10-23 http://www.securityfocus.com/infocus/1740
Intrusion Detection Terminology (Part Two)This is the second and final part of the series that discusses IDS terminology, including terms where there may be disagreement from within the security community. 2003-09-24 http://www.securityfocus.com/infocus/1733
Dynamic HoneypotsThe search for the dream honeypot: dynamic honeypots, an appliance-like plug-and-play solution. 2003-09-15 http://www.securityfocus.com/infocus/1731
Intrusion Detection Terminology (Part One)This is the first of a two-part series that discusses IDS terminology, including terms where there may be disagreement from within the security community. 2003-09-03 http://www.securityfocus.com/infocus/1728
Honeypot FarmsThis article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. 2003-08-13 http://www.securityfocus.com/infocus/1720
Honeytokens: The Other HoneypotThe purpose of this series of honeypot papers is to cover the breadth of honeypot technologies, values and issues. This article extends the capabilities even further by discussing the concept of honeytokens. 2003-07-17 http://www.securityfocus.com/infocus/1713
IDS Correlation of VA Data and IDS AlertsThis article discusses the correlation of VA data and IDS alerts to help prioritize events and reduce the time it takes to sift through events. 2003-06-30 http://www.securityfocus.com/infocus/1708
Honeypots: Are They Illegal?As honeypots and their concepts have grown more popular, people have begun to ask what legal issues could apply. The purpose of this paper is to address the most commonly asked issues. 2003-06-12 http://www.securityfocus.com/infocus/1703
Passive Network Traffic Analysis: Understanding a Network Through Passive MonitoringThis article will offer a brief overview of passive network monitoring, which can offer a thorough understanding of the network's topology: what services are available, what operating systems are in use, and what vulnerabilities may be exposed on the network. 2003-05-21 http://www.securityfocus.com/infocus/1696
Honeypots: Simple, Cost-Effective DetectionThis is the fourth article in an ongoing series on honeypots. This article will examine the role of honeypots in detection. 2003-04-30 http://www.securityfocus.com/infocus/1690 |
|
Privacy Statement |