A novel honeypot based security approach for real-time intrusion detection and prevention systems
In the digitalized modern world in parallel to the new technological developments,
information security has become the highest priority in the individual and institutional sense …
information security has become the highest priority in the individual and institutional sense …
[PDF][PDF] Development of a compressive framework using machine learning approaches for SQL injection attacks
Web applications play an important role in our daily lives. Various Web applications are
used to carry out billions of online transactions. Because of their widespread use, these …
used to carry out billions of online transactions. Because of their widespread use, these …
Remediation for ransomware attacks on cloud drive folders
E Iwanir, C Lahav, G Tamir - US Patent 10,715,533, 2020 - Google Patents
A system for detecting by a cloud service a ransomware attack on a client device is provided.
The system monitors changes to files of the client device that are stored by the cloud service …
The system monitors changes to files of the client device that are stored by the cloud service …
Web application attack detection and forensics: A survey
M Babiker, E Karaarslan… - 2018 6th international …, 2018 - ieeexplore.ieee.org
Web application attacks are an increasingly important area in information security and digital
forensics. It has been observed that attackers are developing the capability to bypass …
forensics. It has been observed that attackers are developing the capability to bypass …
SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks
Honeypot systems are traps for intruders which simulate real systems such as web,
application, and database servers used in information systems. Using these systems …
application, and database servers used in information systems. Using these systems …
[PDF][PDF] How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey.
P Lackner - ICEIS (2), 2021 - scitepress.org
In a digitized world even critical infrastructure relies on computers controlled via networks.
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …
A deep learning assisted personalized deception system for countering web application attacks
Recent years have seen momentous growth in web attacks that has motivated researchers
to come up with sophisticated techniques to tackle them. Lately, there has been growing …
to come up with sophisticated techniques to tackle them. Lately, there has been growing …
A novel method of honeypot inclusive WAF to protect from SQL injection and XSS
S Rahul, CS Vajrala… - … Conference on Disruptive …, 2021 - ieeexplore.ieee.org
In todays world, there are billions of applications on the internet holding a lot of user data
which automatically increases the threat of being attacked by hackers. Often User privacy …
which automatically increases the threat of being attacked by hackers. Often User privacy …
Micro-honeypot: using browser fingerprinting to track attackers
Z Jia, X Cui, Q Liu, X Wang, C Liu - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Web attacks have proliferated across the whole Internet in recent years. To protect websites,
security vendors and researchers collect attack information using web honeypots. However …
security vendors and researchers collect attack information using web honeypots. However …
Evaluation of Reinforcement Learning Algorithm on SSH Honeypot
MA Kristyanto, H Studiawan… - 2022 6th International …, 2022 - ieeexplore.ieee.org
The honeypot is a tool to detect the attacker's activity and can be used as a diversion. But the
growth of attacking techniques makes the attacker realize they are interacting with a …
growth of attacking techniques makes the attacker realize they are interacting with a …