Honeypot utilization for network intrusion detection
S Kemppainen, T Kovanen - Cyber Security: Power and Technology, 2018 - Springer
For research purposes, a honeypot is a system that enables observing attacker's actions in
different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify …
different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify …
[PDF][PDF] Deception using an ssh honeypot
RJ McCaughey - 2017 - upload.wikimedia.org
The number of devices vulnerable to unauthorized cyber access has been increasing at an
alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a …
alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a …
Primer--A Tool for Testing Honeypot Measures of Effectiveness
JM Pittman, K Hoffpauir, N Markle - arXiv preprint arXiv:2011.00582, 2020 - arxiv.org
Honeypots are a deceptive technology used to capture malicious activity. The technology is
useful for studying attacker behavior, tools, and techniques but can be difficult to implement …
useful for studying attacker behavior, tools, and techniques but can be difficult to implement …
Honeypots and the attackers bias
S Hassan, R Guha - International Conference on Cyber …, 2018 - search.proquest.com
Due to an increased emphasis on discovering cyber attackers and their tactics, techniques,
and procedures honeypot use has been on the rise over the last few decades. As new …
and procedures honeypot use has been on the rise over the last few decades. As new …
Honeypot-as-a-Service dengan Kubernetes Cluster
R Purwoko, DF Priambodo, GA Permana… - JEPIN (Jurnal Edukasi … - jurnal.untan.ac.id
Honeypot utilization for analyzing cyber attacks
O Hrad, S Kemppainen - Proccedings of the 10th European Conference …, 2016 - dl.acm.org
Honeypot systems are an effective method for defending production systems from security
breaches and to gain detailed information about attackers' motivation, tactics, software and …
breaches and to gain detailed information about attackers' motivation, tactics, software and …
Framework For Modeling Attacker Capabilities with Deception
S Hassan - 2019 - stars.library.ucf.edu
In this research we built a custom experimental range using opensource emulated and
custom pure honeypots designed to detect or capture attacker activity. The focus is to test the …
custom pure honeypots designed to detect or capture attacker activity. The focus is to test the …
Tietoturvaloukkausten analysointi hunajapurkkijärjestelmän avulla
S Kemppainen - 2016 - jyx.jyu.fi
Tutkielmassa vertailtiin tietoturvaloukkausten ja niiden yritysten tunnistamiseen kehitettyjä
ohjelmistoja, joita käytetään parantamaan organisaatioiden tietoturvallisuutta. Tutkittiin …
ohjelmistoja, joita käytetään parantamaan organisaatioiden tietoturvallisuutta. Tutkittiin …