A novel honeypot based security approach for real-time intrusion detection and prevention systems

M Baykara, R Das - Journal of Information Security and Applications, 2018 - Elsevier
In the digitalized modern world in parallel to the new technological developments,
information security has become the highest priority in the individual and institutional sense …

[PDF][PDF] Development of a compressive framework using machine learning approaches for SQL injection attacks

FG Deriba, AO Salau, SH Mohammed… - Przeglad …, 2022 - pe.org.pl
Web applications play an important role in our daily lives. Various Web applications are
used to carry out billions of online transactions. Because of their widespread use, these …

Remediation for ransomware attacks on cloud drive folders

E Iwanir, C Lahav, G Tamir - US Patent 10,715,533, 2020 - Google Patents
A system for detecting by a cloud service a ransomware attack on a client device is provided.
The system monitors changes to files of the client device that are stored by the cloud service …

Web application attack detection and forensics: A survey

M Babiker, E Karaarslan… - 2018 6th international …, 2018 - ieeexplore.ieee.org
Web application attacks are an increasingly important area in information security and digital
forensics. It has been observed that attackers are developing the capability to bypass …

SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks

M Baykara, R Daş - Turkish Journal of Electrical Engineering …, 2019 - journals.tubitak.gov.tr
Honeypot systems are traps for intruders which simulate real systems such as web,
application, and database servers used in information systems. Using these systems …

[PDF][PDF] How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey.

P Lackner - ICEIS (2), 2021 - scitepress.org
In a digitized world even critical infrastructure relies on computers controlled via networks.
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …

A deep learning assisted personalized deception system for countering web application attacks

WB Shahid, B Aslam, H Abbas, H Afzal… - Journal of Information …, 2022 - Elsevier
Recent years have seen momentous growth in web attacks that has motivated researchers
to come up with sophisticated techniques to tackle them. Lately, there has been growing …

A novel method of honeypot inclusive WAF to protect from SQL injection and XSS

S Rahul, CS Vajrala… - … Conference on Disruptive …, 2021 - ieeexplore.ieee.org
In todays world, there are billions of applications on the internet holding a lot of user data
which automatically increases the threat of being attacked by hackers. Often User privacy …

Micro-honeypot: using browser fingerprinting to track attackers

Z Jia, X Cui, Q Liu, X Wang, C Liu - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Web attacks have proliferated across the whole Internet in recent years. To protect websites,
security vendors and researchers collect attack information using web honeypots. However …

Evaluation of Reinforcement Learning Algorithm on SSH Honeypot

MA Kristyanto, H Studiawan… - 2022 6th International …, 2022 - ieeexplore.ieee.org
The honeypot is a tool to detect the attacker's activity and can be used as a diversion. But the
growth of attacking techniques makes the attacker realize they are interacting with a …