نتایج جستجو برای: dynamic honeypot
تعداد نتایج: 406616 فیلتر نتایج به سال:
This paper presents the design of a secured highinteraction honeypot. The challenge is to have a honeypot that welcomes attackers, allows userland malicious activities but prevents from system corruption. The honeypot must be scalable to authorize a large amount of malicious activities and to analyze those activities efficiently. The hardening of the honeypot is proposed for two kinds of host. ...
Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well method for learning how adversaries work and think. However, over the last years number of researchers have shown methods fingerprinting honeypots. This significantly decreases value honeypot; if attacker is able to recognize existence such sys...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating syst...
This paper analyses data collected over a nine month period in a simple VoIP honeypot based on simple design initially put forward by Usken(2009). The honeypot collected 2083 events of malfeasant activity directed towards commonly used VoIP ports. These events resulted in a range of activity being recorded from simple enumeration to advanced probing and attempts to compromise the victim honeypo...
M.Sithara Department of Computer Science, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] M.Chandran Department of Computer Applications, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] G.Padmavathi Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore-43 Email:...
Distributed Denial of Service (DDoS) attacks can effect the steady functioning of any network, posing a severe security threat. Concentrated single source DDoS attacks consume huge resources like bandwidth in a very small duration and have direct impact at ISP level, thus making them easily detectable. In contrast, diluted low rate DDoS attacks lead to graceful degradation of network over a lon...
–A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends and allow indepth examination of adversaries during and after exploitation of a honeypot. The concept of honeypots was first proposed in Clifford Stoll's book “The Cuckoo's Egg", and Bill C...
In this paper we describe a serious flaw in a popular honeypot software suite that allows an attacker to easily identify the presence and scope of a deployed honeypot. We describe in detail both the flaw and how it can be used by an attacker. Our technique relies on a set of specially crafted packets which are able to elicit a response from a Honeyd-based honeypot. Simple experiments show that ...
Computers security has become a major issue in many organization. There are different solutions to response to this needs but they remain insufficient to truly secure network. Honeypot is used in the area of computer and Internet Security. It is resource which is intended to be attacked and comprised to gain more information about the attacker and their attack techniques. Compared to an intrusi...
Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید