|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Integrating More Intelligence into Your IDS, Part 2SecurityFocus contributor Don Parker continues his discussion on how artificial intelligence is influencing intrusion detection system (IDS) development. 2008-03-12 http://www.securityfocus.com/infocus/1899
Integrating More Intelligence into Your IDS, Part 1SecurityFocus contributor Don Parker explore how artificial intelligence is influencing intrusion detection system (IDS) development, and in this first of two articles, shows examples using the popular Snort platform. 2008-03-05 http://www.securityfocus.com/infocus/1898
Using Nepenthes Honeypots to Detect Common MalwareThis article describes the use of Nepenthes, a low-interaction honeypot, as an additional layer of network defense. Nepenthes can be used to capture malware, alert an administrator about a network compromise, and assist in containing and removing the infection. 2006-11-07 http://www.securityfocus.com/infocus/1880
Sebek 3: tracking the attackers, part twoThe second article in this honeypot series discusses best practices for deploying Sebek 3 inside a GenIII honepot, and shows how to patch Sebek to watch all the attacker's activities in real-time. 2006-02-13 http://www.securityfocus.com/infocus/1858
Sebek 3: tracking the attackers, part oneThe first of this two-part series will discuss what Sebek is and what makes it so interesting, first by looking at the new capabilities of version 3 and how it integrates with GenIII Honeynet infrastructures. 2006-01-16 http://www.securityfocus.com/infocus/1855
Introduction to IPAuditThis article described the usefulness of IPAudit, a network took similar to Netflow that is used to discover botnets, compromised hosts, and other security issues on larger networks. 2005-07-11 http://www.securityfocus.com/infocus/1842
Defeating Honeypots: System Issues, Part 2This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer. 2005-04-06 http://www.securityfocus.com/infocus/1828
Defeating Honeypots: System Issues, Part 1This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer. 2005-03-23 http://www.securityfocus.com/infocus/1826
Issues Discovering Compromised MachinesThis article discusses the discovery of compromised machines in large enterprise environments, and offers some suggestions on correlating NIDS and HIPS logs to avoid false positives. 2004-10-25 http://www.securityfocus.com/infocus/1808
Defeating Honeypots: Network Issues, Part 2The purpose of this paper is to explain how attackers behave when they attempt to identify and defeat honeypots, and is useful information for security professionals who need to deploy honeypots in a more stealthy manner. Part 2 looks at Sebek-based honeypots, snort_inline, Fake AP, and Bait and Switch honeypots. 2004-10-07 http://www.securityfocus.com/infocus/1805 |
|
Privacy Statement |