نتایج جستجو برای: dynamic honeypot
تعداد نتایج: 406616 فیلتر نتایج به سال:
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis tools. A honeypots ability to reliably deceive intruders is a key factor in gathering reliable and forensically sound data. Honeyd’s primary deceptive mechanism is the use of the NMAP fingerprint database to provide b...
In the contemporary world, network security has been of biggest importance and acute worry in both individual institutional wisdom, concurrent with newly emerging technologies. Firewalls, encryption techniques, intrusion detection systems, honeypots are just a few systems technologies that have developed to ensure information security. Systems for safeguarding an organizational environment thro...
Internet sudah menjadi komoditas utama dalam hal komunikasipada era ini. Dengan seiring perkembangan zaman, serangan yang terjadi di internetpun semakin berkembang. Untuk mencegah sebuah banyak sistem atau program dikembangkan untuk menghalau suatu serangan, salah satu diantaranya yaitu honeypot. Honeypot merupakan aplikasi guna mampu menahan, mendeteksi, serta mencatat masuk kedalam jaringan s...
We propose a system for detecting scanning-worm infected machines in a local network. Infected machines are detected after a few unsuccesful connection attempts, and in cooperation with the border router, their traffic is redirected to a honeypot for worm identification and capture. We discuss the architecture of the system and present a sample implementation based on a Linux router. We discuss...
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and with stealth, making organisations highly vulnerable to attack. Deception is an essential element of effective security that has been used in networks to understand attack methods and intrusions. Th...
In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals...
Distributed Denial of Service (DDoS) attacks is the most common type cyber-attack. Therefore, an appropriate mechanism needed to overcome those problems. This paper proposed integration method between honeypot sensor and software defined network (SDN) (SD-honeypot network). In terms attack detection process, server utilized Semi-supervised learning in classification process by combining Pseudo-...
Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor’s browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a datab...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید