您是不是要找: Testing deception honeypots

[PDF][PDF] Testing deceptive honeypots

A Yahyaoui - 2014 - core.ac.uk
… The objective of this thesis was to test the effectiveness of some honeypot tools in real …
adding more deception to them. We tested both a web honeypot tool and an SSH honeypot tool. …

Testing simple deceptive honeypot tools

A Yahyaoui, NC Rowe - Cyber Sensing 2015, 2015 - spiedigitallibrary.org
… This work tested the effectiveness of two free honeypot tools in real networks by varying …
more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool …

[PDF][PDF] Testing deception tactics in response to cyberattacks

E Frederick, N Rowe, A Wong - … of the National Symposium on Moving …, 2012 - core.ac.uk
… approach to finding deceptive tactics for system … a honeypot, a computer system designed
solely as an attack target. We report on three kinds of experiments with deceptive honeypots: …

Evaluation of deception-based web attacks detection

X Han, N Kheir, D Balzarotti - Proceedings of the 2017 Workshop on …, 2017 - dl.acm.org
… For this reason, honeypots are not suitable to perform this test, and collecting data about
hundreds of real attackers is a gigantic effort. We solved this problem by splitting the experiment …

A honeypot proxy framework for deceiving attackers with fabricated content

J Papalitsas, S Rauti, J Tammi, V Leppänen - Cyber Threat Intelligence, 2018 - Springer
Deception is a promising method for strengthening software security. It differs … a honeypot
proxy that generates fallacious content for fake services in order to deceive attackers, and test

Lightweight on-demand honeypot deployment for cyber deception

JC Acosta, A Basak, C Kiekintveld… - … Conference on Digital …, 2021 - Springer
… In the first case, we tested this functionality by designating a wireless node as a decision
node. The Swapper can switch between the different wireless networks, which in the real world …

Honeypots and limitations of deception

M Dornseif, T Holz, S Müller - 2005 - dl.gi.de
… In the second part of this paper we focus on limitations of current honeypotbased methodologies.
… tools and methods of deception and counter deception. 1 Honeypot-based Research …

From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation

F Araujo, KW Hamlen, S Biedermann… - Proceedings of the …, 2014 - dl.acm.org
tested RedHerring with different honey-patched Apache releases. Table 1 summarizes the
tested … purposes, shadow honeypots make no effort to deceive attackers into thinking the …

Detecting honeypots and other suspicious environments

T Holz, F Raynal - Proceedings from the sixth annual IEEE SMC …, 2005 - ieeexplore.ieee.org
… , the situation is similar: If an attacker watches out carefully for signs of deception, he will …
During tests, we had especially problems with pending processes which lead to reboots in …

Determining the effectiveness of deceptive honeynets

N Gupta - 2003 - ro.ecu.edu.au
honeypot technology as well as describes the framework of how to improve the effectiveness
ofhoneypots through the effective use of deception… the deceptive honeypots and testing the …
您是不是要找: Testing deception honeypots