HONEYPOT

作品数:102被引量:213H指数:7
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:唐勇张骏马传龙邓亚平胡华平更多>>
相关机构:国防科学技术大学上海交通大学西北工业大学中国科学技术大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划湖南省教育厅科研基金重庆市科技攻关计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
MV-Honeypot:Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
《Computer Modeling in Engineering & Sciences》2024年第10期655-669,共15页Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park 
supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)(Project Nos.2022-0-00701,10%,RS-2023-00228996,10%,RS-2022-00165794,10%);the ICTR&DProgram of MSIT/IITP(ProjectNo.2021-0-01816,10%);a National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,60%).
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav...
关键词:AVATAR metaverse CYBERSECURITY cloud computing internet of things artificial intelligence security analysis 
Honeypot Game Theory against DoS Attack in UAV Cyber
《Computers, Materials & Continua》2023年第9期2745-2762,共18页Shangting Miao Yang Li Quan Pan 
Basic Scientific Research program of China JCKY2020203C025 funding is involved in this study.
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especia...
关键词:UAV cyber security honeypot game-theoretical model DoS attack 
Monitoring Peer-to-Peer Botnets:Requirements,Challenges,and Future Works
《Computers, Materials & Continua》2023年第5期3375-3398,共24页Arkan Hammoodi Hasan Kabla Mohammed Anbar Selvakumar Manickam Alwan Ahmed Abdulrahman Alwan Shankar Karuppayah 
This work was supported by the Ministry of Higher Education Malaysia’s Fundamental Research Grant Scheme under Grant FRGS/1/2021/ICT07/USM/03/1.
The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as P...
关键词:P2P networks BOTNET P2P botnet botnet monitoring HONEYPOT crawlers 
A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats
《Intelligent Automation & Soft Computing》2023年第3期3331-3348,共18页R.T.Pavendan K.Sankar K.A.Varun Kumar 
Attacks on the cyber space is getting exponential in recent times.Illegal penetrations and breaches are real threats to the individuals and organizations.Conventional security systems are good enough to detect the kno...
关键词:Graph theory DOMINATION Connected Domination Secure Connected Domination HONEYPOT self learning ransomware 
Automatic Botnet Attack Identification Based on Machine Learning
《Computers, Materials & Continua》2022年第11期3847-3860,共14页Peng Hui Li Jie Xu Zhong Yi Xu Su Chen Bo Wei Niu Jie Yin Xiao Feng Sun Hao Liang Lan Lu Lu Chen 
The research of this paper is supported by the project of Jiangsu Provincial Department of Education(20KJB413002);the science and technology research project of Jiangsu Provincial Public Security Department(2020KX007Z);the Jiangsu Police Institute high level talent introduction research start-up fund”(JSPIGKZ,JSPI20GKZL404);the 2021 doctor of entrepreneurship and innovation in Jiangsu Province(JSSCBS20210599);the Undergraduate Innovation and Entrepreneurship Training Program of Jiangsu Police College(No.202110329053Y)。
At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics...
关键词:HONEYPOT LOG network attack machine learning 
Meta-Review of Recent and Landmark Honeypot Research and Surveys被引量:1
《Journal of Information Security》2022年第4期181-209,共29页Gbenga Ikuomenisan Yasser Morgan 
The growing interest in Honeypots has resulted in increased research, and consequently, a large number of research surveys and/or reviews. Most Honeypot surveys and/or reviews focus on specific and narrow Honeypot res...
关键词:HONEYPOT Network Security Intrusion Detection Systematic Review Meta-Review 
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
《Journal of Information Security》2022年第4期210-243,共34页Gbenga Ikuomenisan Yasser Morgan 
Mitigating increasing cyberattack incidents may require strategies such as reinforcing organizations’ networks with Honeypots and effectively analyzing attack traffic for detection of zero-day attacks and vulnerabili...
关键词:Honeypot Data Analysis Network Intrusion Detection Visualization and Visual Analysis Graphical Methods and Perception Systematic Literature Review 
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue被引量:1
《Journal of Information Security》2022年第2期23-42,共20页Wahid Rajeh 
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be...
关键词:Hadoop Security Issue Unauthorized Access Honeypot Node Intrusion Detector 
IoT Honeypot Scanning and Detection System Based on Authorization Mechanism
《国际计算机前沿大会会议论文集》2021年第2期217-228,共12页Ning Li Bo Cui Ziyan Liu Jinchao Ni Cheng Zhang Hanzhang Kong 
This work was supported by project of State Grid Shandong Electric Power Company(No.520627200001).
In this paper,an Internet of Things(IoT)honeypot scanning and detection system is proposed based on an authorization mechanism.For the functional characteristics of different devices existing in the IoT environment,an...
关键词:AUTHORIZATION HONEYPOT Internet of Things Scan detection 
An Adversarial Smart Contract Honeypot in Ethereum被引量:2
《Computer Modeling in Engineering & Sciences》2021年第7期247-267,共21页Yu Han Tiantian Ji Zhongru Wang Hao Liu Hai Jiang Wendi Wang Xiang Cui 
This work was supported by the Guangdong Province Key Field Research and Development Program under Nos.2019B010137003 and 2019B010136004;the National Key Research and Development Program under Grant Nos.2018YFB0803504 and 2019YFA0706404.
A smart contract honeypot is a special type of smart contract.This type of contract seems to have obvious vulnerabilities in contract design.If a user transfers a certain amount of funds to the contract,then the user ...
关键词:HONEYPOT smart contract adversarial bypass detection 
检索报告 对象比较 聚类工具 使用帮助 返回顶部