Методи та засоби аналізу системи-приманки в процесі зламу
DOI:
https://doi.org/10.18372/2410-7840.11.5371Abstract
Методи та засоби аналізу системи-приманки в процесі зламу
References
The Honeynet Project, http://www.honeynet.org
Дудикевич В.Б., Піскозуб А.З.,Тимошик Н.П., Дуткевич Т.В. "Використання віртуалізації для виявлення 0-day атак та розгортання систем віртуальних приманок". III Всеукраїнська науково-практична конференція "Інформаційні технології і безпека в управлінні", Крим, М.Севастополь, Вісник Східноукраїнського національного університету ім.. В. Даля №5 (111), 2007, 4.1. с.53-58.
Тимощук Н.П., Захист комп'ютерних мереж на основі техтологій Intrusion Prevention Systems + Honeynets. Збірник праць "Комп'ютерні науки та інженерія - 2006" (CSE- 2006), НУЛП, 2006, с. 76-80.
Матвеев Д. План действий после атаки на ваш хост - расследование, восстановление, защита // Сетевые решения, 2002. - № 11 - С. 25 - 35.
Taras Dutkevych, Andrian Piskozub , Nazar Tymoshyk "Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks" IEEE International Workshop on
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 6-8 September 2007, Dortmund, Germany p.599-602
"What is DRBD" www.drbd.org
Sebek. http://www.honeynet.org/tools/sebek
"AIDE - Advanced Intrusion Detection Environment". http://www.cs.tut.fi/~rammer/aide.html
"Tripwire® software is a security and data integrity tool", http ://sourceforge .net/proj ects/tripwire/
Clam AntiVirus, www.clamav.net/
Linenoise. http://www.phrack.com/issues.html?issue=61&id=3
Tcpdump www.tcpdump.org/
Wireshark. www.wireshark.org
Snort - the de facto standard for intrusion detection/prevention, www.snort.org/
Prelude IDS. www.prelude-ids.com/
Cisco IDS. http://www.informit.com/articles/article.aspx?p=24696
Cisco ASA. http://www.cisco-systems.ru/katalog/cisco-asa_51/
Nmap - Free Security Scanner For Network Exploration & Security ... nmap.org
Nessus Security scanner for Oracle and various flavors of Unix, www.nessus.org
Core Impact, www.coresecurity.com/
Clam AntiVirus.www.clamav.net
Kaspersky Internet Security, http://kaspersky-antivirus.kiev.ua/products/inetsecurity.htm
Honey wall CDROM. https://projects.honeynet.org/honeywall/
Honeysnap. https://projects.honeynet.org/honeysnap
Capture BAT. https://public.honeynet.org/mailman/listinfo/capture-bat
M. Dornseif, T. Holz, and C. Klein. NoSEBrEaK - Attacking Honeynets. Proc. of the 5th Annual IEEE Information Assurance Workshop, Westpoint, June 2004.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).