[PDF][PDF] Deception using an ssh honeypot

RJ McCaughey - 2017 - upload.wikimedia.org
The number of devices vulnerable to unauthorized cyber access has been increasing at an
alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a …

[PDF][PDF] Testing deceptive honeypots

A Yahyaoui - 2014 - core.ac.uk
Deception can be a useful defensive technique against cyber attacks. It has the advantage
of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for …

[PDF][PDF] Testing a low-interaction honeypot against live cyber attackers

EE Frederick - 2011 - Citeseer
The development of honeypots as decoys designed to detect, investigate, and counterattack
unauthorized use of information systems has produced an arms race between honeypots …

Testing simple deceptive honeypot tools

A Yahyaoui, NC Rowe - Cyber Sensing 2015, 2015 - spiedigitallibrary.org
Deception can be a useful defensive technique against cyber-attacks; it has the advantage
of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for …

Picky attackers: Quantifying the role of system properties on intruder behavior

T Barron, N Nikiforakis - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Honeypots constitute an invaluable piece of technology that allows researchers and security
practitioners to track the evolution of break-in techniques by attackers and discover new …

Configuration Honeypots with an Emphasis on Logging of the Attacks and Redundancy

J Palša, J Hurtuk, E Chovancová… - 2022 IEEE 20th Jubilee …, 2022 - ieeexplore.ieee.org
The number of devices connected to a computer network has increased in recent years. This
is also evidenced by the increased number of attacks and viruses by which attackers try to …

Honeypots and the attackers bias

S Hassan, R Guha - International Conference on Cyber …, 2018 - search.proquest.com
Due to an increased emphasis on discovering cyber attackers and their tactics, techniques,
and procedures honeypot use has been on the rise over the last few decades. As new …

Ssh–somewhat secure host

C Valli - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Honeypots are a proven technology for network defence and forensics. This paper focuses
on attacks directed to network devices that utilise SSH services. The research uses the SSH …

Design and Implementation of a Real-Time Honeypot System for the Detection and Prevention of Systems Attacks

F Samu - 2016 - repository.stcloudstate.edu
A honeypot is a deception tool, designed to entice an attacker to compromise the electronic
information systems of an organization. If deployed correctly, a honeypot can serve as an …

[引用][C] Honeypots: Covert Network Security

J Spriggs, M Lavengood - Proceedings of the 2004 Ascue Conference, Online, 2004