نتایج جستجو برای: honeypot

تعداد نتایج: 652  

2014
Chuandong Li

In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals...

Journal: :IAES International Journal of Artificial Intelligence 2022

Distributed Denial of Service (DDoS) attacks is the most common type cyber-attack. Therefore, an appropriate mechanism needed to overcome those problems. This paper proposed integration method between honeypot sensor and software defined network (SDN) (SD-honeypot network). In terms attack detection process, server utilized Semi-supervised learning in classification process by combining Pseudo-...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

2008
Ali Ikinci Thorsten Holz Felix C. Freiling

Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor’s browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a datab...

Journal: :International Journal of Distributed and Parallel systems 2012

Journal: :Proceedings of the IEEE 2018

Journal: :International Journal of Information and Computer Security 2010

Journal: :Proceedings of International Conference on Artificial Life and Robotics 2018

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2019

2003
Jean-Marc Seigneur Anselm Lambert Patroklos G. Argyroudis Christian D. Jensen

Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss of privacy when third parties obtain email addresses of users without their consent can be followed by unsolicited emails – known as spam – sent on the open communication channel....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید