Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Sidiroglou, Stelios"'
Autor:
Sidiroglou, Stelios1 stelios@cs.columbia.edu, Keromytis, Angelos1 ig2111@cs.columbia.edu
Publikováno v:
International Journal of Information Security. 2006, Vol. 5 Issue 2, p77-91. 15p. 1 Diagram, 5 Charts, 3 Graphs.
Autor:
Anagnostakis, Kostas G., Sidiroglou, Stelios, Akritidis, Periklis, Polychronakis, Michalis, Keromytis, Angelos D., Markatos, Evangelos P.
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network or service. Traffic that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aad1353413d88a4892b3de60ed11192e
Testing vendor-issued patches remains one of the major hurdles to their speedy deployment. Studies have shown that administrators remain reluctant to quickly patch their systems, even when they have the capability to do so, partly because security pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::31b1d6c1cc6f6ffc0e0a87b5ab8c0734
The issue of electronic privacy has of late attracted considerable attention. The proliferation of Internet services and, perhaps unavoidably, Internet crime, in conjunction with expanded government monitoring of communications has caused irreparable
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4ced8557ab4eaf4e1cc275c24f6701d
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collaborative security provides the opportunity to re-examine the utility of so
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3963d1d6e2d77c39f73ed7bedce442b0
Artificial diversity is one method for mitigating the security risks of software monoculture. Introducing diversity increases resilience by obfuscating the system parameters an attacker must control for a successful exploit. We take a different appro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02d9cae1ad548a1a3d55c56c34fb8f6f
Autor:
Anagnostakis, Kostas G., Sidiroglou, Stelios, Akritidis, Periklis, Xinidis, Konstantinos, Markatos, Evangelos, Keromytis, Angelos D.
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::825fbaa75e22d3a25a069b284dc62970
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bbc597d7b909160963504c142e5a9529
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ICSE: International Conference on Software Engineering; Feb2012, p80-90, 11p