This HTML5 document contains 46 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n9http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://localhost/temp/predkladatel/
n12http://purl.org/net/nknouf/ns/bibtex#
n20http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n11http://linked.opendata.cz/resource/domain/vavai/projekt/
n19http://linked.opendata.cz/resource/domain/vavai/subjekt/
n10http://linked.opendata.cz/ontology/domain/vavai/
n17http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28140%2F13%3A43870365%21RIV14-MSM-28140___/
n16https://schema.org/
shttp://schema.org/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
skoshttp://www.w3.org/2004/02/skos/core#
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n7http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28140%2F13%3A43870365%21RIV14-MSM-28140___
rdf:type
n10:Vysledek skos:Concept
dcterms:description
This paper shows possible implementation of honeypot in local network. The honeypot works as the 0-day malware detection system. It implements many of active or semi-active traps in local area network and DMZ in the company network. There are not defined the legal trace to the honeypot. That mean, that common connection does not be forwarded to the honeypot. The approved users and computers are not being able to detect the honeypot. This means that all communication with honeypot coming from the unauthorized devices. The common IDS system does not detect the 0-day vulnerabilities. The trap represented by the honeypot in the network might detect behaviour of new exploits and hacker attempt. This paper shows possible implementation of honeypot in local network. The honeypot works as the 0-day malware detection system. It implements many of active or semi-active traps in local area network and DMZ in the company network. There are not defined the legal trace to the honeypot. That mean, that common connection does not be forwarded to the honeypot. The approved users and computers are not being able to detect the honeypot. This means that all communication with honeypot coming from the unauthorized devices. The common IDS system does not detect the 0-day vulnerabilities. The trap represented by the honeypot in the network might detect behaviour of new exploits and hacker attempt.
dcterms:title
Honeypot as the Intruder Detection System Honeypot as the Intruder Detection System
skos:prefLabel
Honeypot as the Intruder Detection System Honeypot as the Intruder Detection System
skos:notation
RIV/70883521:28140/13:43870365!RIV14-MSM-28140___
n10:predkladatel
n19:orjk%3A28140
n4:aktivita
n5:P
n4:aktivity
P(ED2.1.00/03.0089)
n4:dodaniDat
n7:2014
n4:domaciTvurceVysledku
n20:4684125
n4:druhVysledku
n18:D
n4:duvernostUdaju
n13:S
n4:entitaPredkladatele
n17:predkladatel
n4:idSjednocenehoVysledku
78008
n4:idVysledku
RIV/70883521:28140/13:43870365
n4:jazykVysledku
n22:eng
n4:klicovaSlova
security, honeypot, IDS, network, intruder, malware, exploit
n4:klicoveSlovo
n6:network n6:exploit n6:intruder n6:malware n6:honeypot n6:security n6:IDS
n4:kontrolniKodProRIV
[7C9A7053A7E0]
n4:mistoKonaniAkce
Rhodes
n4:mistoVydani
Kos
n4:nazevZdroje
Proceedings of the 17th WSEAS International Conference on Computers (part of CSCC´13)
n4:obor
n15:IN
n4:pocetDomacichTvurcuVysledku
1
n4:pocetTvurcuVysledku
2
n4:projekt
n11:ED2.1.00%2F03.0089
n4:rokUplatneniVysledku
n7:2013
n4:tvurceVysledku
Kouril, Lukas Malaník, David
n4:typAkce
n9:WRD
n4:zahajeniAkce
2013-07-16+02:00
s:issn
1790-5109
s:numberOfPages
6
n12:hasPublisher
WSEAS Press (GR)
n16:isbn
978-960-474-311-7
n21:organizacniJednotka
28140