نتایج جستجو برای: honeypot

تعداد نتایج: 652  

2014
Jhilam Biswas

With the growing popularity of Internet, security has become one of the most important concerns. Honeypot is a security resource whose value lies in being probed or attacked. It can be used to wave off the security issues arising nowadays. Also one can obtain a considerable amount of information about the attacker and his attacking methodologies. This paper includes brief discussion about diffe...

2013
Pushpa Rani Yashpal Singh

Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Honeypot does work as an Intrusion Detection System which detect the attacker in a network. Activities on honeypots can be considered suspicious by definition, as there is no point for users to interact with these systems. In this paper, we pr...

2015
Muhammet Baykara

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...

2012
Amit Chugh

In this paper we discussed, a hybrid intrusion detection system using honey pot. Hybrid honeypot is the combination of low and high interaction honeypots. It helps in detecting intrusion attacking on the system. For this, I have proposed the hybrid model of hybrid honeypot. Low interaction honeypot provide enough interaction to attackers to allow honeypot to detect interesting attacks. It also ...

2004
NEAL KRAWETZ

information about the spammer’s true identity and help unmask it. In response to the threat that honeypots pose to spammers, the first commercial anti-honeypot technology has surfaced: Send-Safe’s Honeypot Hunter (www.send-safe. com) attempts to detect “safe” proxies for use with bulk-mailing tools. This honeypot-detection system’s appearance, in association with other emerging spam tools, sugg...

Journal: :American Entomologist 2016

2004

exploits in a honeypot is an unusual event). For the latter, we want a better understanding of the areas of interest and hidden links between blackhat teams. One way to achieve these goals is to increase the verbosity of our honeypot logs and traces so that we learn every single action the intruder made. The most common tools for doing this are Sebek (http://project.honeynet.org/tools/ sebek/) ...

2002
Reto Baumann

4 Concepts 3 4.1 Level of Involvement . . . . . . . . . . . . 3 4.1.1 Low-Involvement Honeypot . . . . 3 4.1.2 Mid-Involvement Honeypot . . . . 3 4.1.3 High-Involvement Honeypot . . . . 3 4.1.4 Overview . . . . . . . . . . . . . . 4 4.2 Network Topologies and Honeynets . . . . 4 4.2.1 Honeypot Location . . . . . . . . . 4 4.2.2 Honeynets . . . . . . . . . . . . . . 5 4.3 Host based Information ...

2002
Yashwant Singh

A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhatcommunity), thus deriving their value from the unauthorized use of their resources. This paper discusses ...

2012
Ritu Tiwari Abhishek Jain

Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید