Honeypot utilization for network intrusion detection

S Kemppainen, T Kovanen - Cyber Security: Power and Technology, 2018 - Springer
For research purposes, a honeypot is a system that enables observing attacker's actions in
different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify …

[PDF][PDF] Deception using an ssh honeypot

RJ McCaughey - 2017 - upload.wikimedia.org
The number of devices vulnerable to unauthorized cyber access has been increasing at an
alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a …

Primer--A Tool for Testing Honeypot Measures of Effectiveness

JM Pittman, K Hoffpauir, N Markle - arXiv preprint arXiv:2011.00582, 2020 - arxiv.org
Honeypots are a deceptive technology used to capture malicious activity. The technology is
useful for studying attacker behavior, tools, and techniques but can be difficult to implement …

Honeypots and the attackers bias

S Hassan, R Guha - International Conference on Cyber …, 2018 - search.proquest.com
Due to an increased emphasis on discovering cyber attackers and their tactics, techniques,
and procedures honeypot use has been on the rise over the last few decades. As new …

Honeypot utilization for analyzing cyber attacks

O Hrad, S Kemppainen - Proccedings of the 10th European Conference …, 2016 - dl.acm.org
Honeypot systems are an effective method for defending production systems from security
breaches and to gain detailed information about attackers' motivation, tactics, software and …

Framework For Modeling Attacker Capabilities with Deception

S Hassan - 2019 - stars.library.ucf.edu
In this research we built a custom experimental range using opensource emulated and
custom pure honeypots designed to detect or capture attacker activity. The focus is to test the …

Tietoturvaloukkausten analysointi hunajapurkkijärjestelmän avulla

S Kemppainen - 2016 - jyx.jyu.fi
Tutkielmassa vertailtiin tietoturvaloukkausten ja niiden yritysten tunnistamiseen kehitettyjä
ohjelmistoja, joita käytetään parantamaan organisaatioiden tietoturvallisuutta. Tutkittiin …