Skip to main content

Application of Content Computing in Honeyfarm

  • Conference paper
Information Security Applications (WISA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Included in the following conference series:

  • 932 Accesses

Abstract

Currently there are a wide range of techniques dedicated to network security among which honeyfarm is one of the newest development. Honeyfarm provides replication of web sites aiming to redirect hackers from the corresponding production sites. To achieve the goal, transparency and quick access are the basic requirements for honeyfarm. Content delivery network (CDN) is one method for providing replicated web sites and the technique is able to address the requirement for rapid content delivery by redirecting clients to the replicas. However, there is no transparency in the redirection. Furthermore, CDN also redirect clients in a centralized way which will induce latency in content delivery. This paper describes the ways to improve CDN to make it suitable to use as a routing mechanism for honeyfarm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vakali, A., Pallis, G.: Content delivery Networks: status and trends Aristotle in IEEE Internet Computing, pp. 68–74 (2003)

    Google Scholar 

  2. Baggio, A., van Steen, M.: Transparent Distributed Redirection of HTTP requests. In: Proceedings of the Second IEEE International Symposium on Network Computing and Applications (2003)

    Google Scholar 

  3. Lazar, I.: William, Exploring Content Delivery Networking, July/August 2001, pp. 47–49 (2001)

    Google Scholar 

  4. Spitzner, L.: Honeypots: Tracking Hackers, ch. 3. Addison Wesley, Reading (2002)

    Google Scholar 

  5. Prnjat, O., Liabotis, I., Olukemi, T., Sacks, L.: Policy-based Management for ALAN-Enabled Networks. In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (2002)

    Google Scholar 

  6. Spitzner, L.: Know Your Enemy: Sebek (1990)

    Google Scholar 

  7. Cain, B., Douglis, F., Green, M., Hofmann, M., Nair, R., Potter, D., Spatscheck, O.: Knowing CDN Request-Routing Mechanisms (2000)

    Google Scholar 

  8. Borkar, G.: Content Distribution Networks (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, YY., Lam, KY., Chung, SL., Chi, CH., Sun, JG. (2005). Application of Content Computing in Honeyfarm. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics