supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)(Project Nos.2022-0-00701,10%,RS-2023-00228996,10%,RS-2022-00165794,10%);the ICTR&DProgram of MSIT/IITP(ProjectNo.2021-0-01816,10%);a National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,60%).
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav...
Basic Scientific Research program of China JCKY2020203C025 funding is involved in this study.
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especia...
This work was supported by the Ministry of Higher Education Malaysia’s Fundamental Research Grant Scheme under Grant FRGS/1/2021/ICT07/USM/03/1.
The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as P...
Attacks on the cyber space is getting exponential in recent times.Illegal penetrations and breaches are real threats to the individuals and organizations.Conventional security systems are good enough to detect the kno...
The research of this paper is supported by the project of Jiangsu Provincial Department of Education(20KJB413002);the science and technology research project of Jiangsu Provincial Public Security Department(2020KX007Z);the Jiangsu Police Institute high level talent introduction research start-up fund”(JSPIGKZ,JSPI20GKZL404);the 2021 doctor of entrepreneurship and innovation in Jiangsu Province(JSSCBS20210599);the Undergraduate Innovation and Entrepreneurship Training Program of Jiangsu Police College(No.202110329053Y)。
At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics...
The growing interest in Honeypots has resulted in increased research, and consequently, a large number of research surveys and/or reviews. Most Honeypot surveys and/or reviews focus on specific and narrow Honeypot res...
Mitigating increasing cyberattack incidents may require strategies such as reinforcing organizations’ networks with Honeypots and effectively analyzing attack traffic for detection of zero-day attacks and vulnerabili...
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be...
This work was supported by project of State Grid Shandong Electric Power Company(No.520627200001).
In this paper,an Internet of Things(IoT)honeypot scanning and detection system is proposed based on an authorization mechanism.For the functional characteristics of different devices existing in the IoT environment,an...
This work was supported by the Guangdong Province Key Field Research and Development Program under Nos.2019B010137003 and 2019B010136004;the National Key Research and Development Program under Grant Nos.2018YFB0803504 and 2019YFA0706404.
A smart contract honeypot is a special type of smart contract.This type of contract seems to have obvious vulnerabilities in contract design.If a user transfers a certain amount of funds to the contract,then the user ...