نتایج جستجو برای: dynamic honeypot

تعداد نتایج: 406616  

2003
Lance Spitzner

In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your informa...

2013
Priyanka Paliwal

This paper is about deploying Distributed Honeypot System that captures and analyze the attacks on different operating system on Eucalyptus Iaas cloud. The file based security is proposed and implemented on data to make data access secure on virtual machines and physical system in cloud. This makes the private cloud deployment secure enough due to three layers of security provided by virtualiza...

2012
Jop van der Lelie

An SSH honeypot can be used to study the activities of an attacker by logging the full SSH session. In this paper we present an interactive visualization system that can be used by network security experts to visually analyze large sets of SSH honeypot data. By using different visualizations and interaction techniques the expert can explore SSH sessions and quickly find related sessions which w...

Journal: :JNW 2011
Xianfeng Zhang Narisa Zhao

The frangibility of the scale-free networks under intentional attack is very obvious. In order to study the invulnerability of scale-free networks under intentional attack, the study bring forwards to applying the “honeypot” concept of internet’s safety to scale-free networks. Over random simulated method, a few “honeypot node” as low as 2.5% in scale-free networks can improve the invulnerabili...

2010
Chihhung Lin Chunghuang Yang Shihjen Chen Jainshing Wu

In order to detect threats from the Internet and to reduce the detection cost, this system helps network administrators to analyze the malware information easily and effectively. In this study, we have set up a platform with the honeypot system and have solved several problems including sharing resources and distributing honeypot system module at the same time. This platform was set for researc...

2004
Xing-Yun He Kwok-Yan Lam Siu Leung Chung Chi-Hung Chi Jia-Guang Sun

Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques or powerful tools to distinguish malicious traffic from the huge volume of production traffic. Although honeypots mainly aim at collecting information about hackers’ behaviors, they are n...

2013
Simon J. Bell

The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...

2003
Rick Schoeneck

..........................................................................................................................

2006
Shyam K. Gupta Anand Gupta Renu Damor Vikram Goyal Sangeeta Sabharwal

The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture[5]. The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However, one would like to identify the suspecte...

2009
Gérard Wagener Radu State Alexandre Dulaunoy Thomas Engel

High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction potential. A honeypot can be very restrictive, but then only a few interactions can be observed. If a honeypot is very tolerant though, attackers can quickly achieve their goal. Having the best the trade-off between attacke...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید