[PDF][PDF] A survey: Recent advances and future trends in honeypot research
ML Bringer, CA Chelmecki, H Fujinoki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …
papers on honeypots and related topics mostly published after year 2005. This paper …
[PDF][PDF] A survey on honeypot software and data analysis
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
The use of honeypot in machine learning based on malware detection: A review
IMM Matin, B Rahardjo - … Conference on Cyber and IT Service …, 2020 - ieeexplore.ieee.org
A very significant increase in the spread of malware has resulted in malware analysis using
signature matching approaches and heuristic methods that are no longer suitable for …
signature matching approaches and heuristic methods that are no longer suitable for …
Honware: A virtual honeypot framework for capturing CPE and IoT zero days
Existing solutions are ineffective in detecting zero day exploits targeting Customer Premise
Equipment (CPE) and Internet of Things (IoT) devices. We present honware, a high …
Equipment (CPE) and Internet of Things (IoT) devices. We present honware, a high …
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …
Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries
to provide the transport layer. We show that this architecture is fatally flawed because the …
to provide the transport layer. We show that this architecture is fatally flawed because the …
Using rootkits hiding techniques to conceal honeypot functionality
M Mohammadzad, J Karimpour - Journal of Network and Computer …, 2023 - Elsevier
Honeypot is one of the existing technologies in the area of computer network security. The
goal of Honeypot is to create a tempting target for the attacker. The system that is considered …
goal of Honeypot is to create a tempting target for the attacker. The system that is considered …
Cyber-physical system security with deceptive virtual hosts for industrial control networks
A challenge facing industrial control network administrators is protecting the typically large
number of connected assets for which they are responsible. These cyber devices may be …
number of connected assets for which they are responsible. These cyber devices may be …
Dolos: A novel architecture for moving target defense
G Pagnotta, F De Gaspari, D Hitaj… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Moving Target Defense and Cyber Deception emerged in recent years as two key proactive
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …
Automatic identification of honeypot server using machine learning techniques
C Huang, J Han, X Zhang, J Liu - Security and Communication …, 2019 - Wiley Online Library
Traditional security strategies are powerless when facing novel attacks in the complex
network environment, such as advanced persistent threat (APT). Compared with traditional …
network environment, such as advanced persistent threat (APT). Compared with traditional …