Constructing dynamic honeypot using machine learning

Y Zhang, Y Shi - Proceedings of the 8th International Conference on …, 2023 - dl.acm.org
Honeypot is an active security defense technology that uses false information to lure
attackers into attacking and record their behavior. Traditional honeypots are usually static …

A highly interactive honeypot-based approach to network threat management

X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …

Automatic identification of honeypot server using machine learning techniques

C Huang, J Han, X Zhang, J Liu - Security and Communication …, 2019 - Wiley Online Library
Traditional security strategies are powerless when facing novel attacks in the complex
network environment, such as advanced persistent threat (APT). Compared with traditional …

Identification of SSH Honeypots Using Machine Learning Techniques Based on Multi-Fingerprinting

YJ Zhang, WJ Liu, KN Guo… - 2023 IEEE 6th Information …, 2023 - ieeexplore.ieee.org
Honeypots-a new active defense technique-can accomplish the goal of identifying security
vulnerabilities and extracting attack features by constructing controlled vulnerability traps …

A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm

A Mondal, RT Goswami, S Sen - framework - mecs-press.org
The expansion of the Internet and shared networks aids to the growth of records generated
by nodes connected to the Internet. With the development of network attack technology, all …

Honeydoc: an efficient honeypot architecture enabling all-round design

W Fan, Z Du, M Smith-Creasey… - IEEE journal on …, 2019 - ieeexplore.ieee.org
Honeypots are designed to trap the attacker with the purpose of investigating its malicious
behavior. Owing to the increasing variety and sophistication of cyber attacks, how to capture …

Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools

T Shivaprasad, AS Moulya… - 2024 11th International …, 2024 - ieeexplore.ieee.org
As the network security landscape changes with time and market, organizations seek
different and innovative approaches to strengthen their security defenses. This paper gives a …

APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow

B Dai, Z Zhang, L Wang, Y Liu - International Conference on Smart …, 2021 - Springer
The honeypot can record attacker's aggressive behavior and analyze methods of attack in
order to develop more intelligent protection policies in the system. While traditional honeypot …

Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis

Y Kibret, W Yong - International Journal of Networked and Distributed …, 2013 - Springer
Honeypots are dedicated machines whose aim is to delay and divert attackers away from
critical resources in order to study new methods and tools used by attackers. However, when …

Configuration Honeypots with an Emphasis on Logging of the Attacks and Redundancy

J Palša, J Hurtuk, E Chovancová… - 2022 IEEE 20th Jubilee …, 2022 - ieeexplore.ieee.org
The number of devices connected to a computer network has increased in recent years. This
is also evidenced by the increased number of attacks and viruses by which attackers try to …