نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

Journal: :Journal of Electrical and Computer Engineering 2016

2003
Fabien Pouget Marc Dacier Hervé Debar

Many different terms, definitions and classifications for honeypots, honeynets and other honeytokens have been proposed by several authors during the last 3 years. In this document, we offer a summary of the various proposals and we discuss their advantages and drawbacks. We also offer our own definition at the end of the paper.

2011
Erwin E. Frederick Neil C. Rowe Daniel F. Warren

Journal: :IOP Conference Series: Materials Science and Engineering 2017

Journal: :Undergraduate Academic Research Journal 2012

Journal: :Peritoneal Dialysis International: Journal of the International Society for Peritoneal Dialysis 2013

2014
Amit Chaudhary Heena Goyal

A Honeynet is a highly controlled network that interacts with attackers in cyber space to gather the attack data, to collect intelligence on attack techniques and behaviors of the black hat community. Other security devices like Firewalls, IDS etc are usually based on signatures and there has been large amount work done in the field of signature based detection. With the consideration of unknow...

2011
Samuel O. Hunter Barry Irwin

On a daily basis many of the hosts connected to the Internet experience continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the concern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on kn...

Journal: :IJCWT 2014
Tiago Cruz Jorge Proença Paulo Simões Matthieu Aubigny Moussa Ouedraogo Antonio Graziano Leandros A. Maglaras

Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domainspecific approach to cyber threat detection within ICS, which is one of the most import...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید