نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

Journal: :International Journal of Distributed and Parallel systems 2012

Journal: :Proceedings of the IEEE 2018

Journal: :International Journal of Information and Computer Security 2010

Journal: :Proceedings of International Conference on Artificial Life and Robotics 2018

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2019

2003
Jean-Marc Seigneur Anselm Lambert Patroklos G. Argyroudis Christian D. Jensen

Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss of privacy when third parties obtain email addresses of users without their consent can be followed by unsolicited emails – known as spam – sent on the open communication channel....

2005
Suen Yek

The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type ...

Journal: :Peritoneal dialysis international : journal of the International Society for Peritoneal Dialysis 2013
Elaine Mary Pascoe Serigne Lo Anish Scaria Sunil V Badve Elaine Mary Beller Alan Cass Carmel Mary Hawley David W Johnson

BACKGROUND The HONEYPOT study is a multicenter, open-label, blinded-outcome, randomized controlled trial designed to determine whether, compared with standard topical application of mupirocin for nasal staphylococcal carriage, exit-site application of antibacterial honey reduces the rate of catheter-associated infections in peritoneal dialysis patients. OBJECTIVE To make public the pre-specif...

2009
Jan Göbel

In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the internet, named Amun. For this purpose, the software emulates a wide range of different vulnerabilities. As soon as an attacker exploits one of the emulated vulnerabilities the payload transmitted by the attacker is analyzed and any download URL found is extracted. Next, th...

2005
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Konstantinos Xinidis Evangelos P. Markatos Angelos D. Keromytis

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید