Constructing dynamic honeypot using machine learning
Y Zhang, Y Shi - Proceedings of the 8th International Conference on …, 2023 - dl.acm.org
Honeypot is an active security defense technology that uses false information to lure
attackers into attacking and record their behavior. Traditional honeypots are usually static …
attackers into attacking and record their behavior. Traditional honeypots are usually static …
A highly interactive honeypot-based approach to network threat management
X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …
Automatic identification of honeypot server using machine learning techniques
C Huang, J Han, X Zhang, J Liu - Security and Communication …, 2019 - Wiley Online Library
Traditional security strategies are powerless when facing novel attacks in the complex
network environment, such as advanced persistent threat (APT). Compared with traditional …
network environment, such as advanced persistent threat (APT). Compared with traditional …
Identification of SSH Honeypots Using Machine Learning Techniques Based on Multi-Fingerprinting
YJ Zhang, WJ Liu, KN Guo… - 2023 IEEE 6th Information …, 2023 - ieeexplore.ieee.org
Honeypots-a new active defense technique-can accomplish the goal of identifying security
vulnerabilities and extracting attack features by constructing controlled vulnerability traps …
vulnerabilities and extracting attack features by constructing controlled vulnerability traps …
A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm
A Mondal, RT Goswami, S Sen - framework - mecs-press.org
The expansion of the Internet and shared networks aids to the growth of records generated
by nodes connected to the Internet. With the development of network attack technology, all …
by nodes connected to the Internet. With the development of network attack technology, all …
Honeydoc: an efficient honeypot architecture enabling all-round design
Honeypots are designed to trap the attacker with the purpose of investigating its malicious
behavior. Owing to the increasing variety and sophistication of cyber attacks, how to capture …
behavior. Owing to the increasing variety and sophistication of cyber attacks, how to capture …
Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools
T Shivaprasad, AS Moulya… - 2024 11th International …, 2024 - ieeexplore.ieee.org
As the network security landscape changes with time and market, organizations seek
different and innovative approaches to strengthen their security defenses. This paper gives a …
different and innovative approaches to strengthen their security defenses. This paper gives a …
APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow
B Dai, Z Zhang, L Wang, Y Liu - International Conference on Smart …, 2021 - Springer
The honeypot can record attacker's aggressive behavior and analyze methods of attack in
order to develop more intelligent protection policies in the system. While traditional honeypot …
order to develop more intelligent protection policies in the system. While traditional honeypot …
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Y Kibret, W Yong - International Journal of Networked and Distributed …, 2013 - Springer
Honeypots are dedicated machines whose aim is to delay and divert attackers away from
critical resources in order to study new methods and tools used by attackers. However, when …
critical resources in order to study new methods and tools used by attackers. However, when …
Configuration Honeypots with an Emphasis on Logging of the Attacks and Redundancy
J Palša, J Hurtuk, E Chovancová… - 2022 IEEE 20th Jubilee …, 2022 - ieeexplore.ieee.org
The number of devices connected to a computer network has increased in recent years. This
is also evidenced by the increased number of attacks and viruses by which attackers try to …
is also evidenced by the increased number of attacks and viruses by which attackers try to …