نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

2003
Mark Pickett

Most security technologies are designed to prevent unauthorized activity to resources; systems are put into place as a defensive measure. The honeypot concept takes a more proactive stance by doing the opposite and attracting intruders. It allows them to bring out their best bag of tricks, all the while taking note of their moves and how their tools work. The purpose of this paper is to give a ...

2013
Prakriti Trivedi

This paper is about deploying Honeyd, a virtual honeypot that simulates different operating system on Eucalyptus Iaas cloud and usage of proposed encryption methodology on data to make data access secure. The data collected in capture mode is analyzed to prevent further exploitation of system. KeywordsHoneypot; Honeyd; Virtual Honeypot; Iaas; Low interaction honeypot

Journal: :Int. Arab J. Inf. Technol. 2012
Masood Mansoori Omar Zakaria Abdullah Gani

This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot simplifies the analysis process by classi...

2014
Jhilam Biswas

With the growing popularity of Internet, security has become one of the most important concerns. Honeypot is a security resource whose value lies in being probed or attacked. It can be used to wave off the security issues arising nowadays. Also one can obtain a considerable amount of information about the attacker and his attacking methodologies. This paper includes brief discussion about diffe...

2013
Pushpa Rani Yashpal Singh

Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Honeypot does work as an Intrusion Detection System which detect the attacker in a network. Activities on honeypots can be considered suspicious by definition, as there is no point for users to interact with these systems. In this paper, we pr...

2015
Muhammet Baykara

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...

2012
Amit Chugh

In this paper we discussed, a hybrid intrusion detection system using honey pot. Hybrid honeypot is the combination of low and high interaction honeypots. It helps in detecting intrusion attacking on the system. For this, I have proposed the hybrid model of hybrid honeypot. Low interaction honeypot provide enough interaction to attackers to allow honeypot to detect interesting attacks. It also ...

2004
NEAL KRAWETZ

information about the spammer’s true identity and help unmask it. In response to the threat that honeypots pose to spammers, the first commercial anti-honeypot technology has surfaced: Send-Safe’s Honeypot Hunter (www.send-safe. com) attempts to detect “safe” proxies for use with bulk-mailing tools. This honeypot-detection system’s appearance, in association with other emerging spam tools, sugg...

Journal: :Int. J. Reconfig. Comp. 2012
Sascha Mühlbach Andreas Koch

Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. The setting of honeypots, which emulate vulnerable applications, is one method to collect attack code. We have proposed a dedicated hardware architecture for honeypots which allows both high-speed operation ...

Journal: :American Entomologist 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید