Cyber threat intelligence from honeypot data using elasticsearch

H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …

Picky attackers: Quantifying the role of system properties on intruder behavior

T Barron, N Nikiforakis - Proceedings of the 33rd annual computer …, 2017 - dl.acm.org
Honeypots constitute an invaluable piece of technology that allows researchers and security
practitioners to track the evolution of break-in techniques by attackers and discover new …

Security for smart mobile networks: The NEMESYS approach

E Gelenbe, G Gorbil, D Tzovaras… - … on Privacy and …, 2013 - ieeexplore.ieee.org
The growing popularity of smart mobile devices such as smartphones and tablets has made
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …

Click this, not that: extending web authentication with deception

T Barron, J So, N Nikiforakis - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
With phishing attacks, password breaches, and brute-force login attacks presenting constant
threats, it is clear that passwords alone are inadequate for protecting the web applications …

NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem

E Gelenbe, G Görbil, D Tzovaras, S Liebergeld… - … Sciences and Systems …, 2013 - Springer
As a consequence of the growing popularity of smart mobile devices, mobile malware is
clearly on the rise, with attackers targeting valuable user information and exploiting …

Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence

H Al-Mohannadi, I Awan, J Al Hamar - Service Oriented Computing and …, 2020 - Springer
The understanding of cyber threats to a network is challenging yet rewarding as it allows an
organisation to prevent a potential attack. Numerous efforts have been made to predict cyber …

Assessment of honeypots: Issues, challenges and future directions

BB Gupta, A Gupta - International Journal of Cloud Applications and …, 2018 - igi-global.com
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is
trapped. It is a defensive technique which lures the attacker into performing some illicit …

[PDF][PDF] Cellpot: A concept for next generation cellular network honeypots

S Liebergeld, M Lange, R Borgaonkar - Internet Society, 2014 - ndss-symposium.org
Smartphones have been shown to be vulnerable. Similarly, cellular networks have been
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …

This network is infected: Hostage-a low-interaction honeypot for mobile devices

E Vasilomanolakis, S Karuppayah, M Fischer… - Proceedings of the …, 2013 - dl.acm.org
In recent years, the number of sophisticated cyber attacks has increased rapidly. At the same
time, people tend to utilize unknown, in terms of trustworthiness, wireless networks in their …

[HTML][HTML] Designing a smartphone honeypot system using performance counters

HM Ahmed, NF Hassan, AA Fahad - Karbala International Journal of …, 2017 - Elsevier
This paper presents a design for a honeypot smartphone system. The smartphone honeypot
system has to perform several complex functions, the basic important three functions are …