[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention

MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …

[PDF][PDF] Measurement: Sensors

MR Amal, P Venkadesh - Measurement, 2023 - researchgate.net
ABSTRACT A honeypot is a well-known entrapment technique used by network and Internet
of Things (IoT) security professionals to lure intruders. Unlike traditional security measures …

Hybrid H-DOC: A bait for analyzing cyber attacker behavior

MR Amal, P Venkadesh - International journal of electrical and …, 2023 - hrcak.srce.hr
Sažetak Cyber security is a vital concern for companies with internet-based cloud networks.
These networks are constantly vulnerable to attack, whether from inside or outside …

RPL Attacks Detection and Prevention in IOT Networks with Advanced GRU Deep Learning Algorithm

T Thiyagu, S Krishnaveni - 2022 Smart Technologies …, 2022 - ieeexplore.ieee.org
Cyber-attacks on the Internet of Things have improved significantly more in previous years,
with the expansion of intelligent internet-connected systems and functions. The Internet of …

NexGuard: Industrial Cyber-Physical System Défense Using Ensemble Feature Selection and Explainable Deep Learning Techniques

S Krishnaveni, S Sivamohan, TM Chen… - 2023 2nd …, 2023 - ieeexplore.ieee.org
In recent years, industrial cyber-physical systems (ICPS) have advanced rapidly, resulting in
sophisticated and intelligent networks of industrial devices and systems. These networks …

Mimic Honeypot Design and Analysis

J Guo, H Yuan, M Xu, X Yang - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Aiming at the problem that high-interaction honeypots face great risks. This paper integrates
honeypot technology and mimic defense technology, proposes a honeypot model based on …

Introduction to Cyber Tensions Preventative Analysis and Honeypotting Strategy

T Osmëni, M Ali - 2022 International Conference on Computing …, 2022 - ieeexplore.ieee.org
A cyberforce tasked to counteract cyberthreats must be constantly adapting to the threat
level and technologies. This requires constant research, updating of knowledge and training …

Tracing Phishing Website Original IP Address

KG Babu, J Naveen, PVVD Reddy… - … on Networking and …, 2023 - ieeexplore.ieee.org
security is of utmost significance as every device is connected to the internet. can fluently
steal our credentials and misuse our secret data similar as watchwords, date of birth, etc. To …