نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

2004

exploits in a honeypot is an unusual event). For the latter, we want a better understanding of the areas of interest and hidden links between blackhat teams. One way to achieve these goals is to increase the verbosity of our honeypot logs and traces so that we learn every single action the intruder made. The most common tools for doing this are Sebek (http://project.honeynet.org/tools/ sebek/) ...

2002
Reto Baumann

4 Concepts 3 4.1 Level of Involvement . . . . . . . . . . . . 3 4.1.1 Low-Involvement Honeypot . . . . 3 4.1.2 Mid-Involvement Honeypot . . . . 3 4.1.3 High-Involvement Honeypot . . . . 3 4.1.4 Overview . . . . . . . . . . . . . . 4 4.2 Network Topologies and Honeynets . . . . 4 4.2.1 Honeypot Location . . . . . . . . . 4 4.2.2 Honeynets . . . . . . . . . . . . . . 5 4.3 Host based Information ...

2012
Ritu Tiwari Abhishek Jain

Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...

2009
Jan Vykopal Tomáš Plesník Pavel Minařík

This paper presents a study of successful dictionary attacks against a SSH server and their network-based detection. On the basis of experience in the protection of university network we developed a detection algorithm based on a generic SSH authentication pattern. Thanks to the network-based approach, the detection algorithm is host independent and highly scalable. We deployed a high-interacti...

2011
Yogendra Kumar Jain Surabhi Singh

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection b...

2010
Idris A. Rai Matsiko Perez

We have deployed a honeypot sensor node in Uganda that is connected to a distributed honeypot system managed by Leurrecom.org Honeypot project, which constitutes of a large number of different honeypot sensors distributed across different continents. Once joined the project, the system allows access to the whole dataset collected by all sensors in the distributed system. We use the data collect...

Journal: :IJICS 2010
Ping Wang Lei Wu Ryan Cunningham Cliff Changchun Zou

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

Journal: :International Journal of Networked and Distributed Computing 2013

2006
Shyam K. Gupta Renu Damor Anand Gupta Vikram Goyal

The objective of honeypot database (context honeypot) is to identify a potential privacy violator. A suspected user’s interaction with the database is analyzed to determine suspicion. Such a system must satisfy certain characteristics. One of the such characteristics is obliviousness. The success of such a system depends on its remaining oblivious to the suspected user. In this demo paper, we d...

Journal: :CoRR 2017
Wenjun Fan Zhihui Du David Fernández Víctor A. Villagrá

A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for protectingproduction systemsbydetecting anddeflectingunauthorized accesses. It is also useful for investigating the behavior of attackers, and in particular, unknown attacks. For the past 17 years plenty of effort has been invested in the research and development of honey...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید