A novel honeypot based security approach for real-time intrusion detection and prevention systems

M Baykara, R Das - Journal of Information Security and Applications, 2018 - Elsevier
In the digitalized modern world in parallel to the new technological developments,
information security has become the highest priority in the individual and institutional sense …

From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation

F Araujo, KW Hamlen, S Biedermann… - Proceedings of the …, 2014 - dl.acm.org
Traditional software security patches often have the unfortunate side-effect of quickly alerting
attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly …

HIoTPOT: surveillance on IoT devices against recent threats

UD Gandhi, PM Kumar, R Varatharajan… - Wireless personal …, 2018 - Springer
Abstract Honeypot Internet of Things (IoT)(HIoTPOT) keep a secret eye on IoT devices and
analyzes the various recent threats which are dangerous to IoT devices. In this paper …

[PDF][PDF] A survey on potential applications of honeypot technology in intrusion detection systems

M Baykara, R Daş - International Journal of Computer Networks and …, 2015 - ijcna.org
Information security in the sense of personal and institutional has become a top priority in
digitalized modern world in parallel to the new technological developments. Many methods …

SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks

M Baykara, R Daş - Turkish Journal of Electrical Engineering …, 2019 - journals.tubitak.gov.tr
Honeypot systems are traps for intruders which simulate real systems such as web,
application, and database servers used in information systems. Using these systems …

[HTML][HTML] PocketCTF: a fully featured approach for hosting portable attack and defense cybersecurity exercises

S Karagiannis, C Ntantogian, E Magkos, LL Ribeiro… - Information, 2021 - mdpi.com
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical
aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification …

PhantomFS: File-based deception technology for thwarting malicious users

J Lee, J Choi, G Lee, SW Shim, T Kim - IEEE Access, 2020 - ieeexplore.ieee.org
File-based deception technologies can be used as an additional security barrier when
adversaries have successfully gained access to a host evading intrusion detection systems …

Multi-hypervisor virtual machines

Y Hu, K Gopalan - US Patent 9,798,567, 2017 - Google Patents
US9798567B2 - Multi-hypervisor virtual machines - Google Patents US9798567B2 - Multi-hypervisor
virtual machines - Google Patents Multi-hypervisor virtual machines Download PDF Info …

Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game

EM Kandoussi, M Hanini, I El Mir, A Haqiq - Telecommunication Systems, 2020 - Springer
In a complex network as a cloud computing environment, security is becoming increasingly
based on deception techniques. To date, the static nature of cyber networks offers to …

Cloudskulk: A nested virtual machine based rootkit and its detection

J Connelly, T Roberts, X Gao, J **ao… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
When attackers compromise a computer system and obtain root control over the victim
system, retaining that control and avoiding detection become their top priority. To achieve …