Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
Demystifying deception technology: A survey
Deception boosts security for systems and components by denial, deceit, misinformation,
camouflage and obfuscation. In this work an extensive overview of the deception technology …
camouflage and obfuscation. In this work an extensive overview of the deception technology …
An adaptive honeypot configuration, deployment and maintenance strategy
D Fraunholz, M Zimmermann… - 2017 19th International …, 2017 - ieeexplore.ieee.org
Since honeypots first appeared as an advanced network security concept they suffer from
poor deployment and maintenance strategies. State-of-the-Art deployment is a manual …
poor deployment and maintenance strategies. State-of-the-Art deployment is a manual …
Approaches for preventing honeypot detection and compromise
M Tsikerdekis, S Zeadally… - 2018 Global …, 2018 - ieeexplore.ieee.org
Honeypots have been used extensively for over two decades. However, their development
is rarely accompanied with an understanding of how attackers are able to detect them …
is rarely accompanied with an understanding of how attackers are able to detect them …
On designing low-risk honeypots using generative pre-trained transformer models with curated inputs
J Ragsdale, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
Honeypots are utilized as defensive tools within a monitored environment to engage
attackers and gather artifacts for the development of indicators of compromise. However …
attackers and gather artifacts for the development of indicators of compromise. However …
Qrassh-a self-adaptive ssh honeypot driven by q-learning
Developed for the first time in the 80s, honeypot systems research increased tremendously
in the last decade. Moving from simple monitored, emulated, Internet Services, towards …
in the last decade. Moving from simple monitored, emulated, Internet Services, towards …
RASSH-Reinforced adaptive SSH honeypot
The wide spread of cyber-attacks made the need of gathering as much information as
possible about them, a real demand in nowadays global context. The honeypot systems …
possible about them, a real demand in nowadays global context. The honeypot systems …
Towards basic design principles for high-and medium-interaction honeypots
D Fraunholz, F Pohl, HD Schotten - Proceedings of 16th …, 2017 - books.google.com
Recently, the increase of interconnectivity has led to a rising amount of threats in the
cyberspace. Reconnaissance is crucial to develop and optimize mitigation strategies against …
cyberspace. Reconnaissance is crucial to develop and optimize mitigation strategies against …
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework
D Fraunholz, D Krohmer, F Pohl… - 2018 9th IFIP …, 2018 - ieeexplore.ieee.org
Information security is a fast-changing domain. Traditional security mechanisms such as
firewalls and access control are circumvented regularly. The amount of significant security …
firewalls and access control are circumvented regularly. The amount of significant security …
A taxonomy for dynamic honeypot measures of effectiveness
JM Pittman, K Hoffpauir, N Markle… - arXiv preprint arXiv …, 2020 - arxiv.org
Honeypots are computing systems used to capture unauthorized, often malicious, activity.
While honeypots can take on a variety of forms, researchers agree the technology is useful …
While honeypots can take on a variety of forms, researchers agree the technology is useful …