If you go down to the Internet today – Deceptive Honeypots
نویسندگان
چکیده
ABSTRACT This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.
منابع مشابه
Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach
Over the last few years, network based intrusions have increased rapidly, due to the increase and popularity of various attack tools easily available today. Due to this increase in intrusions, the concept of network Honeypots are being developed, which can be used to trap and decode the attack methods of the malicious attackers. This paper will review the current state of honeypot technology as...
متن کاملWhat makes a good muffin ? Ivan
Today most cooking projects start off by consulting the Internet for recipes. A quick search for “chocolate chip muffins” returns a multitude of different recipes, and typically, we would look though the top rated ones and try to decide which one “looks best”. We would go down the ingredients list, make a few substitutions, depending on what’s left in the fridge, and maybe scale down the recipe...
متن کاملIs Honeyd Effective or Not?
Honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. This paper describes the framework of how to improve the effectiveness of honeypots through the effective use of deception. In this research a legitimate corporate deceptive network is cr...
متن کاملMedium Interaction Honeypots
Autonomously spreading malware has been a global threat to the Internet Community ever since the existence of the Internet as a large-scale computer network. A specialization of this threat are botnets; recent trends towards commercialization of botnets made the situation even worse. This document outlines the weaknesses of different existing approaches to catch malware – especially bots – and ...
متن کاملEditorial: What Is Brain Mapping?
G20 World Brain Mapping Initiative (Neuroscience/N-20) is Putting Brain Mapping on the top of Global Economic Issues The Society for Brain Mapping, Therapeutics, and Brain Mapping Foundation are propelling therapeutic advances in Nano-Neurosurgery, Nano-Bio-Electronics, Artificial Intelligence, Neuro-Supercomputing and ‘cross-pollination’ among the bio-medical sciences and engine...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003