翻訳と辞書
Words near each other
・ Clidemia hirta
・ Clidicus
・ Clidicus (beetle)
・ Clidinium bromide
・ Clidoderma
・ Cliefden Caves
・ Client
・ Client (album)
・ Client (band)
・ Client (computing)
・ Client access license
・ Client Access to Integrated Services and Information
・ Client certificate
・ Client confidentiality
・ Client First Settlement Funding
Client honeypot
・ Client Initiated Remote Access
・ Client Music Synthesis
・ Client politics
・ Client portal
・ Client Puzzle Protocol
・ Client state
・ Client's Day
・ Client-side
・ Client-side encryption
・ Client-side persistent data
・ Client-side prediction
・ Client-side scripting
・ Client-to-client protocol
・ Client/Server Runtime Subsystem


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Client honeypot : ウィキペディア英語版
Client honeypot
Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search of malicious servers that attack clients. The client honeypot poses as a client and interacts with the server to examine whether an attack has occurred. Often the focus of client honeypots is on web browsers, but any client that interacts with servers can be part of a client honeypot (for example ftp, ssh, email, etc.).
There are several terms that are used to describe client honeypots. Besides client honeypot, which is the generic classification, honeyclient is the other term that is generally used and accepted. However, there is a subtlety here, as "honeyclient" is actually a homograph that could also refer to the first known open source client honeypot implementation (see below), although this should be clear from the context.
== Architecture ==
A client honeypot is composed of three components. The first component, a queuer, is responsible for creating a list of servers for the client to visit. This list can be created, for example, through crawling. The second component is the client itself, which is able to make a requests to servers identified by the queuer. After the interaction with the server has taken place, the third component, an analysis engine, is responsible for determining whether an attack has taken place on the client honeypot.
In addition to these components, client honeypots are usually equipped with some sort of containment strategy to prevent successful attacks from spreading beyond the client honeypot. This is usually achieved through the use of firewalls and virtual machine sandboxes.
Analogous to traditional server honeypots, client honeypots are mainly classified by their interaction level: high or low; which denotes the level of functional interaction the server can utilize on the client honeypot. In addition to this there are also newly hybrid approaches which denotes the usage of both high and low interaction detection techniques.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Client honeypot」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.