نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

2010
Chih-Hung Lin Chung-Huang Yang

For years, numbers of researches had addressed the serious matters of network attacks, and developed various technologies such as firewalls and intrusion detection systems to prevent the malware attacking. Currently, technologies lack any investigative features because of the network information gathering is too difficult. In this study, we designed a network forensics system, which contented h...

2002
Nathalie Weiler

Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them are successful on themselves alone. In this paper, we present a system that helps in the defence in depth of a network from DDoS attacks. In addition to state-of-art active and passive security defences, we propose a h...

2011
Collin Mulliner Steffen Liebergeld

Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order t...

2014
Tarun Varshney Aishwary Katiyar Pankaj Sharma

MANETs are the wireless networks of the mobile computing devices with no support of any fixed infrastructure. The mobile nodes use any of the radio technology like Bluetooth, IEEE 802. I I or Hiperlan for directly communicating with each other. The nodes behave as hosts as well as routers. The security challenges in MANET arise due to its dynamic topology, vulnerable wireless link and nomadic e...

2011
Hussein Al-Azzawi Ivan Strnad

2012
Shengzhi Zhang Peng Liu

Drivers, especially third party drivers, could contain malicious code (e.g., logic bombs) or carefully designed-in vulnerabilities. Generally, it is extremely difficult for static analysis to identify these code and vulnerabilities. Without knowing the exact triggers that cause the execution/exploitation of these code/vulnerabilities, dynamic taint analysis cannot help either. In this paper, we...

Journal: :International Journal for Information Security Research 2019

Journal: :INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY 2019

Journal: :International Journal of Security and Its Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید