Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency

A Korchenko, V Breslavskyi, S Yevseiev… - 2021 - repository.hneu.edu.ua
One of the pressing areas that is developing in the field of information security is associated
with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for …

Website and network security techniques against brute force attacks using honeypot

A Nursetyo, EH Rachmawanto… - … on Informatics and …, 2019 - ieeexplore.ieee.org
The development of the internet and the web makes human activities more practical,
comfortable, and inexpensive. So that the use of the internet and websites is increasing in …

[PDF][PDF] 蜜罐技术研究新进展

石乐义, 李阳, 马猛飞 - 电子与信息学报, 2019 - jeit.ac.cn
蜜罐技术是网络防御中的陷阱技术, 它通过吸引诱骗攻击者并记录其攻击行为,
从而研究学习敌手的攻击目的和攻击手段, 保护真实服务资源. 然而, 传统蜜罐技术存在着静态 …

[PDF][PDF] An Edge-enabled Virtual Honeypot Based Intrusion Detection System for Vehicle-to-Everything (V2X) Security using Machine Learning.

S Thangam, SS Chakkaravarthy - IAENG International Journal of …, 2024 - iaeng.org
Securing vehicle-to-everything (V2X) communications is essential as intelligent
transportation system integration progresses to guarantee the dependability and safety of …

Honeypots vulnerabilities to backdoor attack

F Javid, MZ Lighvan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Honeypots are widely used to increase the security of systems and networks, but they only
observe the activities that are done against them. A honeypot will not be able to detect an …

Latest research progress of honeypot technology

L SHI, Y LI, M MA - 电子与信息学报, 2019 - jeit.ac.cn
Honeypot technology is a network trap in cyber defense. It can attract and deceive attackers
and record their attack behavior, so as to study the target and attack means of the adversary …

Preventing ransomware from encrypting files on a target machine

E Aharoni, V Goldstein, M Sapir, J Kitaichik - US Patent 11,531,753, 2022 - Google Patents
US11531753B2 - Preventing ransomware from encrypting files on a target machine - Google
Patents US11531753B2 - Preventing ransomware from encrypting files on a target machine …

[PDF][PDF] Nothing to see here!

J Pinoy, F van den Broek, H Jonker - 2021 - research.ou.nl
Website cloaking is a technique that enables websites to deliver different content to different
clients, with the goal of hiding particular content from certain clients. Website cloaking is …

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic

J Park, T Kwon, Y Lee, S Choi… - Journal of the Korea …, 2017 - koreascience.kr
The internet is an important infra resource that it controls the economy and society of our
country. Also, it is providing convenience and efficiency of the everyday life. But, a case of …

[PDF][PDF] 다크넷트래픽의목적지포트를활용한블랙IP 탐지에관한연구

박진학, 권태웅, 이윤수, 최상수, 송중석 - 정보보호학회논문지, 2017 - koreascience.kr
요 약인터넷은 우리나라의 경제· 사회를 움직이는 중요한 인프라 자원이며 일상생활의 편리성·
효율성을 제공하고 있다. 하지만, 인터넷 인프라 자원의 취약점을 이용하여 사용자를 위협하는 …