Survey of contemporary open-source honeypots, frameworks, and tools

N Ilg, P Duplys, D Sisejkovic, M Menth - Journal of Network and Computer …, 2023 - Elsevier
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …

MAGD: Minimal attack graph generation dynamically in cyber security

M Mohammadzad, J Karimpour, F Mahan - Computer Networks, 2023 - Elsevier
Cyber security faces challenges in detecting and mitigating complex attacks. Security
solutions have employed Attack Graphs (AGs) for modeling multi-stage attacks, but …

Cyber attacker's next action prediction on dynamic real-time behavior model

M Mohammadzad, J Karimpour, F Mahan - Computers and Electrical …, 2024 - Elsevier
This paper addresses the critical need for enhanced threat analysis amid escalating cyber
threats. Recognizing limitations in current network-level Attack Graphs (AGs), including …

[PDF][PDF] Detection and Analysis of Active Attacks using Honeypot

W Ahmad, MA Raza, S Nawaz… - International Journal of …, 2023 - researchgate.net
Honeypots are computer systems specifically deployed to deceive attackers so that they
consider them legitimate computers. Honeypots are actually a trap to trick the attackers so …

Response Generation Honeypot with Anti-Detection Capabilities for IoT Botnet Lifecycle Detection

H Tang, H He, Y Feng, J Meng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the widespread use of edge computing, the security issues on the edge side of IoT
within the cloud-edge-device architecture are becoming increasingly severe, particularly …

Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements

J Heluany, A Amro, V Gkioulos, S Katsikas - … of the 2024 ACM/IEEE 4th …, 2024 - dl.acm.org
This research delves into the consolidation of Digital Twin and cyber deception technologies
and explores their potential synergy for advancing cybersecurity processes. The study …

Secure positioning of wireless sensor networks against wormhole attacks

X Yu, X Wang, Y Liu - Telecommunication Systems, 2024 - Springer
In wireless sensor networks, the location of nodes is closely related to all tasks, so the
accuracy and security of node localization are highly required. The core of the DV-HOP …

Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements

J Barbosa Heluany, AW Amro… - 2024 ACM/IEEE 4th …, 2024 - ntnuopen.ntnu.no
This research delves into the consolidation of Digital Twin and cyber deception technologies
and explores their potential synergy for advancing cybersecurity processes. The study …

THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT

F Faldi, D Romadoni… - JIKO (Jurnal Informatika …, 2023 - ejournal.unkhair.ac.id
Network Server security is an important aspect of ensuring the integrity and availability of
information systems. This research aims to implement network Server security at …

Usefulness of Honeypots Towards Data Security: A Systematic Literature Review

KE Silaen, M Meyliana, HLHS Warnars… - 2023 International …, 2023 - ieeexplore.ieee.org
The increasing data volume given by the exponential growth of digital devices, cloud
platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This …