نتایج جستجو برای: honeypot
تعداد نتایج: 652 فیلتر نتایج به سال:
In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals...
Distributed Denial of Service (DDoS) attacks is the most common type cyber-attack. Therefore, an appropriate mechanism needed to overcome those problems. This paper proposed integration method between honeypot sensor and software defined network (SDN) (SD-honeypot network). In terms attack detection process, server utilized Semi-supervised learning in classification process by combining Pseudo-...
Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor’s browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a datab...
Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss of privacy when third parties obtain email addresses of users without their consent can be followed by unsolicited emails – known as spam – sent on the open communication channel....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید