نتایج جستجو برای: honeypot

تعداد نتایج: 652  

2013
OSAMA HAYATLE Osama Hayatle Hadi Otrok

Analytical Models for the Interaction Between Botmasters and Honeypots

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Computer Modeling in Engineering & Sciences 2021

2009
Jan Vykopal Tomáš Plesník Pavel Minařík

This paper presents a study of successful dictionary attacks against a SSH server and their network-based detection. On the basis of experience in the protection of university network we developed a detection algorithm based on a generic SSH authentication pattern. Thanks to the network-based approach, the detection algorithm is host independent and highly scalable. We deployed a high-interacti...

2013
Vladimir B. Oliveira Zair Abdelouahab Denivaldo Lopes Mario H. Santos Valéria P. Fernandes

Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile d...

2010
Chih-Hung Lin Chung-Huang Yang

For years, numbers of researches had addressed the serious matters of network attacks, and developed various technologies such as firewalls and intrusion detection systems to prevent the malware attacking. Currently, technologies lack any investigative features because of the network information gathering is too difficult. In this study, we designed a network forensics system, which contented h...

2002
Nathalie Weiler

Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them are successful on themselves alone. In this paper, we present a system that helps in the defence in depth of a network from DDoS attacks. In addition to state-of-art active and passive security defences, we propose a h...

2011
Collin Mulliner Steffen Liebergeld

Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order t...

2011
Hussein Al-Azzawi Ivan Strnad

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید