Monitoring activities in hosts prepared to be compromised (Honeypots) / Monitoração de atividades em máquinas preparadas para serem comprometidas (Honeypots)

AUTOR(ES)
DATA DE PUBLICAÇÃO

2004

RESUMO

Not long ago, information systems security was closely associated with passive protection, always assuming a purely defensive stance. Nowadays, this approach is changing. Reactive measures are helping to improve systems security, with the use of hosts prepared to be compromised (honeypots) providing information about the techniques used by the attackers, from the attackers themselves. Based on this new approach to information systems security, the present work aims to develop a system to stealthily monitor all the attackers activities in the honeypots and transfer this information to monitoring stations.

ASSUNTO(S)

redes de computadores segurança computacional funções de kernel computer segurity operating systems (computers) computer networks computaÇÃo aplicada computer science kernel functions sistemas operacionais

Documentos Relacionados