نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

Journal: :JIP 2016
Yin Minn Pa Pa Shogo Suzuki Katsunari Yoshioka Tsutomu Matsumoto Takahiro Kasama Christian Rossow

We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...

2003
Craig Valli

This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis tools. A honeypots ability to reliably deceive intruders is a key factor in gathering reliable and forensically sound data. Honeyd’s primary deceptive mechanism is the use of the NMAP fingerprint database to provide b...

Journal: :International Journal of Safety and Security Engineering 2022

In the contemporary world, network security has been of biggest importance and acute worry in both individual institutional wisdom, concurrent with newly emerging technologies. Firewalls, encryption techniques, intrusion detection systems, honeypots are just a few systems technologies that have developed to ensure information security. Systems for safeguarding an organizational environment thro...

Journal: :Jurnal Repositor 2022

Internet sudah menjadi komoditas utama dalam hal komunikasipada era ini. Dengan seiring perkembangan zaman, serangan yang terjadi di internetpun semakin berkembang. Untuk mencegah sebuah banyak sistem atau program dikembangkan untuk menghalau suatu serangan, salah satu diantaranya yaitu honeypot. Honeypot merupakan aplikasi guna mampu menahan, mendeteksi, serta mencatat masuk kedalam jaringan s...

2007
Diego Zamboni James Riordan Milton Yates

We propose a system for detecting scanning-worm infected machines in a local network. Infected machines are detected after a few unsuccesful connection attempts, and in cooperation with the border router, their traffic is redirected to a honeypot for worm identification and capture. We discuss the architecture of the system and present a sample implementation based on a Linux router. We discuss...

2004
Suen Yek

The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and with stealth, making organisations highly vulnerable to attack. Deception is an essential element of effective security that has been used in networks to understand attack methods and intrusions. Th...

2014
Chuandong Li

In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals...

Journal: :IAES International Journal of Artificial Intelligence 2022

Distributed Denial of Service (DDoS) attacks is the most common type cyber-attack. Therefore, an appropriate mechanism needed to overcome those problems. This paper proposed integration method between honeypot sensor and software defined network (SDN) (SD-honeypot network). In terms attack detection process, server utilized Semi-supervised learning in classification process by combining Pseudo-...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

2008
Ali Ikinci Thorsten Holz Felix C. Freiling

Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor’s browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a datab...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید