Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency
A Korchenko, V Breslavskyi, S Yevseiev… - 2021 - repository.hneu.edu.ua
One of the pressing areas that is developing in the field of information security is associated
with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for …
with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for …
Website and network security techniques against brute force attacks using honeypot
A Nursetyo, EH Rachmawanto… - … on Informatics and …, 2019 - ieeexplore.ieee.org
The development of the internet and the web makes human activities more practical,
comfortable, and inexpensive. So that the use of the internet and websites is increasing in …
comfortable, and inexpensive. So that the use of the internet and websites is increasing in …
[PDF][PDF] An Edge-enabled Virtual Honeypot Based Intrusion Detection System for Vehicle-to-Everything (V2X) Security using Machine Learning.
S Thangam, SS Chakkaravarthy - IAENG International Journal of …, 2024 - iaeng.org
Securing vehicle-to-everything (V2X) communications is essential as intelligent
transportation system integration progresses to guarantee the dependability and safety of …
transportation system integration progresses to guarantee the dependability and safety of …
Honeypots vulnerabilities to backdoor attack
F Javid, MZ Lighvan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Honeypots are widely used to increase the security of systems and networks, but they only
observe the activities that are done against them. A honeypot will not be able to detect an …
observe the activities that are done against them. A honeypot will not be able to detect an …
Latest research progress of honeypot technology
L SHI, Y LI, M MA - 电子与信息学报, 2019 - jeit.ac.cn
Honeypot technology is a network trap in cyber defense. It can attract and deceive attackers
and record their attack behavior, so as to study the target and attack means of the adversary …
and record their attack behavior, so as to study the target and attack means of the adversary …
Preventing ransomware from encrypting files on a target machine
E Aharoni, V Goldstein, M Sapir, J Kitaichik - US Patent 11,531,753, 2022 - Google Patents
US11531753B2 - Preventing ransomware from encrypting files on a target machine - Google
Patents US11531753B2 - Preventing ransomware from encrypting files on a target machine …
Patents US11531753B2 - Preventing ransomware from encrypting files on a target machine …
[PDF][PDF] Nothing to see here!
J Pinoy, F van den Broek, H Jonker - 2021 - research.ou.nl
Website cloaking is a technique that enables websites to deliver different content to different
clients, with the goal of hiding particular content from certain clients. Website cloaking is …
clients, with the goal of hiding particular content from certain clients. Website cloaking is …
A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic
J Park, T Kwon, Y Lee, S Choi… - Journal of the Korea …, 2017 - koreascience.kr
The internet is an important infra resource that it controls the economy and society of our
country. Also, it is providing convenience and efficiency of the everyday life. But, a case of …
country. Also, it is providing convenience and efficiency of the everyday life. But, a case of …
[PDF][PDF] 다크넷트래픽의목적지포트를활용한블랙IP 탐지에관한연구
박진학, 권태웅, 이윤수, 최상수, 송중석 - 정보보호학회논문지, 2017 - koreascience.kr
요 약인터넷은 우리나라의 경제· 사회를 움직이는 중요한 인프라 자원이며 일상생활의 편리성·
효율성을 제공하고 있다. 하지만, 인터넷 인프라 자원의 취약점을 이용하여 사용자를 위협하는 …
효율성을 제공하고 있다. 하지만, 인터넷 인프라 자원의 취약점을 이용하여 사용자를 위협하는 …