نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

Journal: :JDFSL 2010
Craig Valli

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a rep...

2008
Steve Webb James Caverlee Calton Pu

Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spammers. Unfortunately, little is known about these social spammers, their level of sophistication, or their strategies and tactics. Thus, in this paper, we provide the first characterization of social spammers and their be...

Journal: :CoRR 2004
Maximillian Dornseif Sascha May

Honeynets are collections networked of computer systems which are intended to be attacked and broken into in an observed fashion, keeping track of any (mis-)use. Similar to other IT-security technologies there is a lot of gospel on the benefits of Honeynets, while there is little analysis on the exact gain offered by them and the associated cost. We are presenting a model helpful in understandi...

2008
Olivier Thonnard Jouni Viinikka Corrado Leita Marc Dacier

We describe the on-going work towards further automating the analysis of data generated by a large honeynet architecture called Leurre.com and SGNET. The underlying motivation is helping us to integrate the use of honeypot data into daily network security monitoring. We propose a system based on two automated steps: i) the detection of relevant attack events within a large honeynet traffic data...

Journal: :International journal of cyber forensics and advanced threat investigations 2021

Airline websites are the victims of unauthorised online travel agencies and aggregators that use armies bots to scrape prices flight information. These so-called Advanced Persistent Bots (APBs) highly sophisticated. On top valuable information taken away, these huge quantities requests consume a very substantial amount resources on airlines' websites. In this work, we propose deceptive approach...

Journal: :The Journal of Digital Policy and Management 2013

Journal: :Journal of Physics: Conference Series 2021

Journal: :Proceeding of the Electrical Engineering Computer Science and Informatics 2018

Journal: :IEEE Access 2021

The proliferation of insecure Internet-connected devices gave rise to the IoT botnets which can grow very large rapidly and may perform high-impact cyber-attacks. related studies for tackling are concerned with either capturing or analyzing botnet samples, using honeypots sandboxes, respectively. lack integration between two implies that samples captured by must be manually submitted analysis i...

Journal: :Computers & Security 2007
Guido Schryen

Email communication is encumbered with a mass of email messages which their recipients have neither requested nor require. Even worse, the impacts of these messages are far from being simply an annoyance, as they also involve economic damage. This manuscript examines the resource " email addresses " , which is vital for any potential bulk mailer and spammer. Both a methodology and a honeypot co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید