Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1066677.1066749acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Honeynet based distributed adaptive network forensics and active real time investigation

Published: 13 March 2005 Publication History

Abstract

Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forensics system can analysis and reconstruct the attack behaviors. These two systems integrating together can help to build an active self-learning and response system to profile the intrusion behavior features and investigate the attack original source. In this paper, we present a design of honeynet based active network intrusion response system. The features of our system are distributed adaptive network forensics and active real time network investigation.

References

[1]
Know Your Enemy: Gen II Honeynets, November 2003. http://project.honeynet.org/papers/gen2/
[2]
Gary Palmer, A Road Map for Digital Forensic Research, Technical Report DTRT0010-01, DFRWS, November 2001. Report from the First Digital Forensic Research Workshop (DFRWS)

Cited By

View all
  • (2016)Graph-based Forensic Analysis of Web HoneypotJournal of Telecommunications and Information Technology10.26636/jtit.2016.2.7202:2016(60-65)Online publication date: 30-Jun-2016
  • (2013)A Review of Current Research in Network Forensic AnalysisInternational Journal of Digital Crime and Forensics10.4018/jdcf.20130101015:1(1-26)Online publication date: 1-Jan-2013
  • (2011)Honeypots and Network ForensicsHoneypots10.1201/b10738-12(298-323)Online publication date: 4-May-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
March 2005
1814 pages
ISBN:1581139640
DOI:10.1145/1066677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer forensics
  2. digital forensics
  3. honeynet
  4. network
  5. network forensics
  6. network security

Qualifiers

  • Article

Conference

SAC05
Sponsor:
SAC05: The 2005 ACM Symposium on Applied Computing
March 13 - 17, 2005
New Mexico, Santa Fe

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Graph-based Forensic Analysis of Web HoneypotJournal of Telecommunications and Information Technology10.26636/jtit.2016.2.7202:2016(60-65)Online publication date: 30-Jun-2016
  • (2013)A Review of Current Research in Network Forensic AnalysisInternational Journal of Digital Crime and Forensics10.4018/jdcf.20130101015:1(1-26)Online publication date: 1-Jan-2013
  • (2011)Honeypots and Network ForensicsHoneypots10.1201/b10738-12(298-323)Online publication date: 4-May-2011
  • (2010)Towards Simulating a Virtual Distributed Honeynet at KFUPMProceedings of the 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation10.1109/EMS.2010.58(316-321)Online publication date: 17-Nov-2010
  • (2010)A Multi-component View of Digital Forensics2010 International Conference on Availability, Reliability and Security10.1109/ARES.2010.61(647-652)Online publication date: Feb-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media