All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Automatic analysis of attack data from distributed honeypot network

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F13%3A86086892" target="_blank" >RIV/61989100:27240/13:86086892 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/13:86086892

  • Result on the web

    <a href="http://dx.doi.org/10.1117/12.2015514" target="_blank" >http://dx.doi.org/10.1117/12.2015514</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1117/12.2015514" target="_blank" >10.1117/12.2015514</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Automatic analysis of attack data from distributed honeypot network

  • Original language description

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server commu

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of SPIE - The International Society for Optical Engineering. Volume 8755

  • ISBN

    978-0-8194-9546-4

  • ISSN

    0277-786X

  • e-ISSN

  • Number of pages

    7

  • Pages from-to

    875512, 1-7

  • Publisher name

    SPIE

  • Place of publication

    Bellingham

  • Event location

    Baltimore

  • Event date

    Apr 29, 2013

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000323598400026