نتایج جستجو برای: honeypot

تعداد نتایج: 652  

Journal: :JIKO (Jurnal Informatika dan Komputer) 2023

Network Server security is an important aspect of ensuring the integrity and availability information systems. This research aims to implement network at Muhammadiyah University East Kalimantan using Honeypot technology. Honeypots are used attract attention attacks monitor suspicious activities on network. The method NDLC (Network Development Life Cycle), which includes design implementation Ho...

Journal: :International journal of electrical and computer engineering systems 2023

Cyber security is a vital concern for companies with internet-based cloud networks. These networks are constantly vulnerable to attack, whether from inside or outside organization. Due the ever-changing nature of cyber world, solutions must be updated regularly in order keep infrastructure secure. With use attack detection approaches, systems such as antivirus, firewalls, intrusion have become ...

Journal: :IEEE Access 2022

The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. To protect these entities learn about adversaries, data attackers can be realistically gathered using decoy systems like honeypots. Admittedly, honeypots introduces trade-off...

Journal: :International Journal of Computer Network and Information Security 2021

Technologies used in ICS and Smart Grid are overlapping. The most discussed attacks on ICSs Stuxnet Black energy malware. anatomy of these not only pointed out that the security is prime concern but also demanded to execute a proactive approach practicing security. Honeypot implement defensive measures for Honeynet group released labelled as Conpot 2013. Though low interactive Honeypot, it emul...

Journal: :Security and Communication Networks 2022

This research demonstrates a design of an experiment hacker infiltrating server where it is assumed that the communication between and target established, also escalated his rights on server. Therefore, honeypot setup has been designed to reveal correlation hacker’s actions with experience, personality, expertise, psychology. To best our knowledge, such never tested rigorously implementation ex...

Journal: :Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 2020

Journal: :Journal of Engineering and Applied Sciences 2019

Journal: :The Journal of the Korea institute of electronic communication sciences 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید