نتایج جستجو برای: dynamic honeypot
تعداد نتایج: 406616 فیلتر نتایج به سال:
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your informa...
This paper is about deploying Distributed Honeypot System that captures and analyze the attacks on different operating system on Eucalyptus Iaas cloud. The file based security is proposed and implemented on data to make data access secure on virtual machines and physical system in cloud. This makes the private cloud deployment secure enough due to three layers of security provided by virtualiza...
An SSH honeypot can be used to study the activities of an attacker by logging the full SSH session. In this paper we present an interactive visualization system that can be used by network security experts to visually analyze large sets of SSH honeypot data. By using different visualizations and interaction techniques the expert can explore SSH sessions and quickly find related sessions which w...
The frangibility of the scale-free networks under intentional attack is very obvious. In order to study the invulnerability of scale-free networks under intentional attack, the study bring forwards to applying the “honeypot” concept of internet’s safety to scale-free networks. Over random simulated method, a few “honeypot node” as low as 2.5% in scale-free networks can improve the invulnerabili...
In order to detect threats from the Internet and to reduce the detection cost, this system helps network administrators to analyze the malware information easily and effectively. In this study, we have set up a platform with the honeypot system and have solved several problems including sharing resources and distributing honeypot system module at the same time. This platform was set for researc...
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques or powerful tools to distinguish malicious traffic from the huge volume of production traffic. Although honeypots mainly aim at collecting information about hackers’ behaviors, they are n...
The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...
..........................................................................................................................
The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture[5]. The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However, one would like to identify the suspecte...
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction potential. A honeypot can be very restrictive, but then only a few interactions can be observed. If a honeypot is very tolerant though, attackers can quickly achieve their goal. Having the best the trade-off between attacke...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید