Testing a Low - Interaction Honeypot against Live Cyber

نویسندگان

  • Erwin E. Frederick
  • Neil C. Rowe
  • Daniel F. Warren
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Testing a low-interaction honeypot against live cyber attackers

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including s...

متن کامل

Design and Implementation of Linux Based Hybrid Client Honeypot Incorporating Multi Layer Detection

In current global internet cyber space, the number of targeted client side attacks are increasing that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, therefore there is requirement of strong mechanisms to fight against these kinds of attacks. In this paper, we present the design and implementation of a client honeypot which incorporate the functional...

متن کامل

INTERCEPT: high-interaction server-type honeypot based on live migration

This paper aims at developing a honeypot system for web applications. The key idea is employing migration techniques to create a virtual machine as a honey web server, and making the honeypot to equip the same memory and block content of the real systems. Recently, web applications have been the target of numerous cyber attacks. In order to catch up new vulnerabilities in the applications, usin...

متن کامل

IAEA-CN-228-127 1 The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems

Programmable logic controllers (PLCs) are used widely to control industrial processes and communicate with the supervisory system. Until recently, industrial operators relied on the assumption that these PLCs are isolated from the online world and hence cannot be the target of attacks. Recent events, such as the infamous Stuxnet attack directed the attention of the security and control system c...

متن کامل

Building a Honeypot to Research Cyber-Attack Techniques Interim report

The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011