Testing a Low - Interaction Honeypot against Live Cyber
نویسندگان
چکیده
منابع مشابه
Testing a low-interaction honeypot against live cyber attackers
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including s...
متن کاملDesign and Implementation of Linux Based Hybrid Client Honeypot Incorporating Multi Layer Detection
In current global internet cyber space, the number of targeted client side attacks are increasing that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, therefore there is requirement of strong mechanisms to fight against these kinds of attacks. In this paper, we present the design and implementation of a client honeypot which incorporate the functional...
متن کاملINTERCEPT: high-interaction server-type honeypot based on live migration
This paper aims at developing a honeypot system for web applications. The key idea is employing migration techniques to create a virtual machine as a honey web server, and making the honeypot to equip the same memory and block content of the real systems. Recently, web applications have been the target of numerous cyber attacks. In order to catch up new vulnerabilities in the applications, usin...
متن کاملIAEA-CN-228-127 1 The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems
Programmable logic controllers (PLCs) are used widely to control industrial processes and communicate with the supervisory system. Until recently, industrial operators relied on the assumption that these PLCs are isolated from the online world and hence cannot be the target of attacks. Recent events, such as the infamous Stuxnet attack directed the attention of the security and control system c...
متن کاملBuilding a Honeypot to Research Cyber-Attack Techniques Interim report
The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...
متن کامل