[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fu**oki - International Journal of …, 2012‏ - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

A survey of honeypot research: Trends and opportunities

RM Campbell, K Padayachee… - 2015 10th international …, 2015‏ - ieeexplore.ieee.org
The number of devices connected to computer networks is increasing daily, and so is the
number of network-based attacks. A honeypot is a system trap that is set to act against …

A review of the current state of Honeynet architectures and tools

DV Silva, GDR Rafael - International Journal of Security …, 2017‏ - inderscienceonline.com
Honeynets originated as a security tool designed to be tracked, attacked and compromised
by hypothetical intruders. They consist of network environments and sets of applications …

Cyber deception using honeypot allocation and diversity: A game theoretic approach

AH Anwar, CA Kamhoua - 2022 IEEE 19th Annual Consumer …, 2022‏ - ieeexplore.ieee.org
Cyber deception has become the core of advanced enterprise-level defense systems. It is
also being used for early detection by many experts. In this paper, we propose a novel …

[PDF][PDF] Forging A Smart Dependable Data Integrity And Protection System Through Hybrid-Integration Honeypot In Web and Database Server

AA Ojugo, RE Yoro - Technology Report of Kansai University, 2020‏ - researchgate.net
The digital world is rapidly converging and converting a lot of our valuable data on to its
digital equivalent. Its dissemination as eased via the advent of the Internet has also led to …

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

S Sentanoe, B Taubmann, HP Reiser - Secure IT Systems: 23rd Nordic …, 2018‏ - Springer
Secure Shell (SSH) is a preferred target for attacks, as it is frequently used with password-
based authentication, and weak passwords can be easily exploited using brute-force …

Ssh bruteforce attack classification using machine learning

MA Kristyanto, I Krisnahati, F Rawung… - … on Information and …, 2022‏ - ieeexplore.ieee.org
One of the problems in computer network security is Intrusion Detection. To detect it, we
need a NIDS (Network Intrusion Detection). One example of NIDS is a honeypot. In this …

PhantomFS-v2: Dare you to avoid this trap

J Choi, H Lee, Y Park, HK Kim, J Lee, Y Kim… - IEEE …, 2020‏ - ieeexplore.ieee.org
It has been demonstrated that deception technologies are effective in detecting advanced
persistent threats and zero-day attacks which cannot be detected by traditional signature …

Assessing security health of public wifi environments in the uae

LA Hammad, M Ati - 2020 IEEE 7th International Conference on …, 2020‏ - ieeexplore.ieee.org
In recent years, a noticeable increase has been observed in cyber-attacks that target public
networks WiFi. These attacks happen due to the vast use of smartphones and the large …

[PDF][PDF] Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies

J Briffaut, JF Lalande, C Toinard - International journal on …, 2009‏ - researchgate.net
Enforcement of security properties by Operating Systems is an open problem. To the best of
our knowledge, the solution presented in this paper1 is the first one that enables a wide …