[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fujinoki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

The use of honeypot in machine learning based on malware detection: A review

IMM Matin, B Rahardjo - … Conference on Cyber and IT Service …, 2020 - ieeexplore.ieee.org
A very significant increase in the spread of malware has resulted in malware analysis using
signature matching approaches and heuristic methods that are no longer suitable for …

Honware: A virtual honeypot framework for capturing CPE and IoT zero days

A Vetterl, R Clayton - 2019 APWG symposium on electronic …, 2019 - ieeexplore.ieee.org
Existing solutions are ineffective in detecting zero day exploits targeting Customer Premise
Equipment (CPE) and Internet of Things (IoT) devices. We present honware, a high …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale

A Vetterl, R Clayton - 12th USENIX Workshop on Offensive Technologies …, 2018 - usenix.org
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries
to provide the transport layer. We show that this architecture is fatally flawed because the …

Using rootkits hiding techniques to conceal honeypot functionality

M Mohammadzad, J Karimpour - Journal of Network and Computer …, 2023 - Elsevier
Honeypot is one of the existing technologies in the area of computer network security. The
goal of Honeypot is to create a tempting target for the attacker. The system that is considered …

Cyber-physical system security with deceptive virtual hosts for industrial control networks

T Vollmer, M Manic - IEEE Transactions on Industrial …, 2014 - ieeexplore.ieee.org
A challenge facing industrial control network administrators is protecting the typically large
number of connected assets for which they are responsible. These cyber devices may be …

Dolos: A novel architecture for moving target defense

G Pagnotta, F De Gaspari, D Hitaj… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Moving Target Defense and Cyber Deception emerged in recent years as two key proactive
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …

Automatic identification of honeypot server using machine learning techniques

C Huang, J Han, X Zhang, J Liu - Security and Communication …, 2019 - Wiley Online Library
Traditional security strategies are powerless when facing novel attacks in the complex
network environment, such as advanced persistent threat (APT). Compared with traditional …