Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

A review of the current state of Honeynet architectures and tools

DV Silva, GDR Rafael - International Journal of Security …, 2017 - inderscienceonline.com
Honeynets originated as a security tool designed to be tracked, attacked and compromised
by hypothetical intruders. They consist of network environments and sets of applications …

Honeyboost: Boosting honeypot performance with data fusion and anomaly detection

S Kandanaarachchi, H Ochiai, A Rao - Expert Systems with Applications, 2022 - Elsevier
With insider attacks becoming more common and costing organizations more every year, it
has never been more crucial to be able to predict when an insider attack may happen …

Anti-honeypot enabled optimal attack strategy for industrial cyber-physical systems

B Li, Y Xiao, Y Shi, Q Kong, Y Wu… - IEEE Open Journal of …, 2020 - ieeexplore.ieee.org
Honeypots have been widely used in the security community to understand the cyber threat
landscape, for example to study unauthorized penetration attempts targeting industrial cyber …

[PDF][PDF] A captcha–based intrusion detection model

B Souley, H Abubakar - Int. J. Softw. Eng. Appl, 2018 - academia.edu
Intrusion Detection systems (IDS) are an essential element for Network Security
Infrastructure and play an important role in detecting large number of attacks. Intrusion …

Performance estimation of honeynet system for network security enhancement via copula linguistic

MS Isa, J Wu, İ Yusuf - Sigma Journal of Engineering and Natural …, 2024 - dergipark.org.tr
Honeypots are computer systems that deceive cyber attackers into believing they are
ordinary computer systems designed for invasion, when in fact they are primarily designed …

Web attack detection based on traps

N Stevanović, B Todorović, V Todorović - Applied Intelligence, 2022 - Springer
Every website on the Internet is somewhat vulnerable to security attacks. These attacks are
constantly changing, and it is challenging to detect the latest, not known attacks. Our goal is …

Securing smart cities through machine learning: A honeypot‐driven approach to attack detection in Internet of Things ecosystems

Y Ahmed, K Beyioku, M Yousefi - IET Smart Cities, 2024 - Wiley Online Library
The rapid increase and adoption of Internet of Things (IoT) devices have introduced
unprecedented conveniences into modern life. However, this growth has also ushered in a …

Research on Network Intrusion Detection Technology Based on Honeypot

F Dang, L Yan, Y Yang, S Li… - 2024 5th International …, 2024 - ieeexplore.ieee.org
With the development of the network, people are becoming more and more dependent on
the network for their work and lives, this makes the network environment complex. At the …

Using Honey Pot Technique Ransomeware Get Detected

S Raja, K Venkatesh - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Ransomware is the challenging threat it will stop the user from their activity so the user can't
access the data of the system. Ransomware is the challenging threat it will stop the user to …