نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

2009
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Michalis Polychronakis Angelos D. Keromytis Evangelos P. Markatos

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network or service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the ...

2003
John G. Levine Richard LaBella Henry L. Owen Didier Contis Brian Culver

©2003 IEEE. Person or promotional purpo copyrighted compon Abstract – Comput continue to be compro in spite of the fact t security mechanism at Enterprise Networks, university, are very inv to exploit networks. L many machines runni networks normally ha high speed/high band to the requirement administrators are re place on users on thes on these networks ma traffic within the en Honeynet can be...

2015
Pavol Sokol

Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...

2006
Eric Alata Marc Dacier Yves Deswarte M. Kaaâniche K. Kortchinsky Vincent Nicomette Van-Hau Pham Fabien Pouget

2009
Robin G. Berthier

Title of Document: Advanced Honeypot Architecture for Network Threats Quantification Robin Berthier, Ph.D., 2009 Directed By: Associate Professor Michel Cukier, Reliability Engineering Program Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered...

2013
OSAMA HAYATLE Osama Hayatle Hadi Otrok

Analytical Models for the Interaction Between Botmasters and Honeypots

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Computer Modeling in Engineering & Sciences 2021

2016
Saad Abdullah Alsunbul Phu Dung Le Jan Newmarch Jefferson Tan

Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solution...

2013
Vladimir B. Oliveira Zair Abdelouahab Denivaldo Lopes Mario H. Santos Valéria P. Fernandes

Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید