نتایج جستجو برای: honeypot

تعداد نتایج: 652  

Journal: :JNW 2011
Xianfeng Zhang Narisa Zhao

The frangibility of the scale-free networks under intentional attack is very obvious. In order to study the invulnerability of scale-free networks under intentional attack, the study bring forwards to applying the “honeypot” concept of internet’s safety to scale-free networks. Over random simulated method, a few “honeypot node” as low as 2.5% in scale-free networks can improve the invulnerabili...

2010
Chihhung Lin Chunghuang Yang Shihjen Chen Jainshing Wu

In order to detect threats from the Internet and to reduce the detection cost, this system helps network administrators to analyze the malware information easily and effectively. In this study, we have set up a platform with the honeypot system and have solved several problems including sharing resources and distributing honeypot system module at the same time. This platform was set for researc...

2004
Xing-Yun He Kwok-Yan Lam Siu Leung Chung Chi-Hung Chi Jia-Guang Sun

Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques or powerful tools to distinguish malicious traffic from the huge volume of production traffic. Although honeypots mainly aim at collecting information about hackers’ behaviors, they are n...

2013
Simon J. Bell

The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...

2003
Rick Schoeneck

..........................................................................................................................

2006
Shyam K. Gupta Anand Gupta Renu Damor Vikram Goyal Sangeeta Sabharwal

The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture[5]. The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However, one would like to identify the suspecte...

2009
Gérard Wagener Radu State Alexandre Dulaunoy Thomas Engel

High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction potential. A honeypot can be very restrictive, but then only a few interactions can be observed. If a honeypot is very tolerant though, attackers can quickly achieve their goal. Having the best the trade-off between attacke...

2015
Sanjeev Kumar Amandeep kaur

In the domain of network security, many technologies and tools have been used throughout the years to create and test systems of network intrusion detection system and to test the strengthen of computer security system. One of these is the honeypot. A honeypot appears as a normal part of the network but in actual way it is an isolated environment which monitors the malicious activities in a net...

2015
Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad

Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to craft attacks that are being used to scam unsuspecting users who have traditionally trusted the telephone. It is necessary to better understand telephony threats to effectively combat them. Although there exist crowd sourced complaint datasets about telephony abuse, such complaints are often filed after...

Journal: :international journal of information, security and systems management 2012
alireza saeedi hassan khotanlou mohammad nassiri

honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. most of the present honeypots are configured and installed on the network statically. in some cases considerations have been made on dynamic configuration of honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید