Collapsar: A VM-Based Architecture for Network Attack Detention Center

@inproceedings{Jiang2004CollapsarAV,
  title={Collapsar: A VM-Based Architecture for Network Attack Detention Center},
  author={Xuxian Jiang and Dongyan Xu},
  booktitle={USENIX Security Symposium},
  year={2004}
}
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though effective, a single honeypot or multiple independently operated honeypots only provide a limited local view of network attacks. Deploying and managing a large number of coordinating honeypots in different network domains will not only provide a broader and more diverse view, but also create potentials in global network status inference, early network anomaly detection, and… CONTINUE READING
Highly Cited
This paper has 148 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 103 extracted citations

Honeypot-Architectures using VMI Techniques

Stefan Floeren Betreuer, Nadine Herold, Stephan Posselt
2013
View 9 Excerpts
Highly Influenced

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment

2012 Seventh Asia Joint Conference on Information Security • 2012
View 5 Excerpts
Highly Influenced

A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems

2017 IEEE Conference on Network Softwarization (NetSoft) • 2017
View 3 Excerpts

149 Citations

0102030'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 149 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 21 references

A Virtual Honeypot Framework

USENIX Security Symposium • 2004
View 4 Excerpts
Highly Influenced

Honeypot Farms

L. Spitzner
http://www.securityfocus.com/infocus/1720, Aug. • 2003
View 3 Excerpts
Highly Influenced

Network Telescopes: Observing Small or Distant Security Events

D. Moore
Proceedings of the 11th USENIX Security Symposium, Aug. • 2002
View 4 Excerpts
Highly Influenced

Backtracking intrusions

ACM Trans. Comput. Syst. • 2005
View 2 Excerpts

Forensix: a robust, high-performance reconstruction system

25th IEEE International Conference on Distributed Computing Systems Workshops • 2005
View 2 Excerpts

Honeypots: Counter measures to VMware fingerprinting

K. Kortchinsky
http://seclists.org/lists/honeypots/2004/Jan- Mar/0015.html, Jan. • 2004
View 1 Excerpt

Protection mechanisms for application service hosting platforms

IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004. • 2004
View 1 Excerpt

Dynamic Honeypots

L. Spitzner
http://www.securityfocus.com/infocus/1731, Sept. • 2003
View 1 Excerpt

Honeypots: Tracking Hackers

L. Spitzner
Addison- Wesley, • 2003
View 1 Excerpt

Similar Papers

Loading similar papers…