نتایج جستجو برای: honeypot

تعداد نتایج: 652  

2005
Suen Yek

The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type ...

Journal: :Peritoneal dialysis international : journal of the International Society for Peritoneal Dialysis 2013
Elaine Mary Pascoe Serigne Lo Anish Scaria Sunil V Badve Elaine Mary Beller Alan Cass Carmel Mary Hawley David W Johnson

BACKGROUND The HONEYPOT study is a multicenter, open-label, blinded-outcome, randomized controlled trial designed to determine whether, compared with standard topical application of mupirocin for nasal staphylococcal carriage, exit-site application of antibacterial honey reduces the rate of catheter-associated infections in peritoneal dialysis patients. OBJECTIVE To make public the pre-specif...

2009
Jan Göbel

In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the internet, named Amun. For this purpose, the software emulates a wide range of different vulnerabilities. As soon as an attacker exploits one of the emulated vulnerabilities the payload transmitted by the attacker is analyzed and any download URL found is extracted. Next, th...

2005
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Konstantinos Xinidis Evangelos P. Markatos Angelos D. Keromytis

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the pro...

2009
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Michalis Polychronakis Angelos D. Keromytis Evangelos P. Markatos

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network or service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the ...

2003
John G. Levine Richard LaBella Henry L. Owen Didier Contis Brian Culver

©2003 IEEE. Person or promotional purpo copyrighted compon Abstract – Comput continue to be compro in spite of the fact t security mechanism at Enterprise Networks, university, are very inv to exploit networks. L many machines runni networks normally ha high speed/high band to the requirement administrators are re place on users on thes on these networks ma traffic within the en Honeynet can be...

2015
Pavol Sokol

Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...

2006
Eric Alata Marc Dacier Yves Deswarte M. Kaaâniche K. Kortchinsky Vincent Nicomette Van-Hau Pham Fabien Pouget

2009
Robin G. Berthier

Title of Document: Advanced Honeypot Architecture for Network Threats Quantification Robin Berthier, Ph.D., 2009 Directed By: Associate Professor Michel Cukier, Reliability Engineering Program Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید