To see the other types of publications on this topic, follow the link: Client Honeypot.

Journal articles on the topic 'Client Honeypot'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 journal articles for your research on the topic 'Client Honeypot.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

K,, Santhosh. "Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01620.

Full text
Abstract:
Sensitive data on e-commerce websites has been more vulnerable to cyberattacks in recent years, especially when those assaults take advantage of SQL injection flaws. Botnets are a ubiquitous hazard that increase the risks by automating large-scale attacks. This paper provides a new method for preventing SQL injection-based botnet assaults on e-commerce websites by creating and deploying an intrusion detection system (IDS) based on honeypots. By tricking attackers into interacting with dummy systems and then watching and analyzing their actions, the suggested solution seeks to proactively detect and neutralize such attacks. Our system improves the security posture of e-commerce platforms by using a combination of machine learning algorithms, anomaly detection techniques, and honeypot deployment. This protects sensitive client data and maintains business integrity. Keywords: E-commerce, SQL injection, Botnet, Honeypot, Intrusion Detection System, Machine Learning, Anomaly Detection
APA, Harvard, Vancouver, ISO, and other styles
2

Jung, Hyun-Mi, Seung-Wan Son, Kwang-Seok Kim, and Gang-Soo Lee. "A High-Interaction Client Honeypot on Android Platform." Journal of Digital Policy and Management 11, no. 12 (2013): 381–86. http://dx.doi.org/10.14400/jdpm.2013.11.12.381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

AKIYAMA, Mitsuaki, Takeshi YAGI, Youki KADOBAYASHI, Takeo HARIU, and Suguru YAMAGUCHI. "Client Honeypot Multiplication with High Performance and Precise Detection." IEICE Transactions on Information and Systems E98.D, no. 4 (2015): 775–87. http://dx.doi.org/10.1587/transinf.2014icp0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.

Full text
Abstract:
Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the stages of analysis, design, implementation, and monitoring. The content analysis method has been using to explore the problems and requirements of the system built. The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). The test has been carrying out on 3 test parameters (confidentiality, availability, and integrity), comparison testing method has been using to test the integrity parameters. The test results indicate that the system functionality test for user needs have fulfilled, the results of the confidentiality test (83.3%), availability (93.3%), and the integrity of the inline-mode snort show faster response time (0.069 seconds on average) and more CPU resource usage efficient (0.04% average) than the cowrie honeypot. IPS snort inline-mode overall integrity parameter testing is more recommended for used network security systems than cowrie honeypots.
APA, Harvard, Vancouver, ISO, and other styles
5

AKIYAMA, Mitsuaki, Makoto IWAMURA, Yuhei KAWAKOYA, Kazufumi AOKI, and Mitsutaka ITOH. "Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks." IEICE Transactions on Communications E93-B, no. 5 (2010): 1131–39. http://dx.doi.org/10.1587/transcom.e93.b.1131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Iqbal, Muhammad, Arini Arini, and Hendra Bayu Suseno. "ANALISA DAN SIMULASI KEAMANAN JARINGAN UBUNTU SERVER DENGAN PORT KNOCKING, HONEYPOT, IPTABLES, ICMP." Cyber Security dan Forensik Digital 3, no. 1 (2020): 27–32. http://dx.doi.org/10.14421/csecurity.2020.3.1.1933.

Full text
Abstract:
Keamanan jaringan komputer sangatlah penting untuk menjaga kerahasiaan data dan informasi yang terdapat pada server. Data dan informasi ini hanya ditujukan untuk administrator dan user yang berhak mengakses saja melalui port layanan. Membiarkan port penting terbuka adalah kesalahan fatal yang dapat mengakibatkan serangan terhadap server, umumnya teknik yang sering dilakukan adalah scan port dan bruteforce. Hal lain untuk melindungi server dengan firewall adalah salah satu metode yang dapat diterapkan pula, namun penggunaan firewall tidak efektif dikarenakan akan memblok semua layanan tanpa memperdulikan siapapun termasuk administrator. Untuk tujuan tersebut maka penelitian ini dilakukan, dengan menggunakan metode port knocking yang di kembangkan dengan metode lainnya yaitu mengkombinasikan dengan Honeypot, IPtables dan ICMP. IPtables sendiri menggantikan peran dari firewall, untuk menentukan aturan port mana yang akan di filter, sehingga setiap paket yang masuk pada filtered port akan di-refused. Port knocking berfungsi untuk menentukan ketukan rahasia terhadap port layanan server. Honeypot untuk mengalihkan server port pada port tiruan dan sengaja terbuka agar kita tahu apa saja upaya yang dilakukan untuk memasuki server, dan ICMP berfungsi sebagai ping request dari client terhadap server.
APA, Harvard, Vancouver, ISO, and other styles
7

Malar, Benjula Anbu, and Prabhu J. "Data Storage Security in the Cloud Environment Using the Honey Pot System." International Journal of e-Collaboration 16, no. 4 (2020): 1–14. http://dx.doi.org/10.4018/ijec.2020100101.

Full text
Abstract:
Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called ‘multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.
APA, Harvard, Vancouver, ISO, and other styles
8

Papazis, Kon, and Naveen Chilamkurti. "Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems." Future Internet 16, no. 12 (2024): 455. https://doi.org/10.3390/fi16120455.

Full text
Abstract:
The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining inconspicuous. Cybercriminals are improving their ability to detect EMS, by finding indicators of deception (IoDs) to expose their presence and avoid detection. It is proving a challenge for security analysts to deploy and manage EMS to evaluate their deceptive capability. In this paper, we introduce the Hydrakon framework, which is composed of an EMS controller and several Linux and Windows 10 clients. The EMS controller automates the deployment and management of the clients and EMS for the purpose of measuring EMS deceptive capabilities. Experiments were conducted by applying custom detection vectors to client real machines, virtual machines and sandboxes, where various artifacts were extracted and stored as csv files on the EMS controller. The experiment leverages the cosine similarity metric to compare and identify similar artifacts between a real system and a virtual machine or sandbox. Our results show that Hydrakon offers a valid approach to assess the deceptive capabilities of EMS without the need to target specific IoD within the target system, thereby fostering more robust and effective emulated monitoring systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Mansoori, Masood, and Ray Hunt. "An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users." International Journal of Network Security & Its Applications 3, no. 5 (2011): 59–73. http://dx.doi.org/10.5121/ijnsa.2011.3505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ndichu, Samuel, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, and Daisuke Inoue. "Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods." Applied Sciences 12, no. 1 (2021): 60. http://dx.doi.org/10.3390/app12010060.

Full text
Abstract:
Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. Methods such as blocklisting, client honeypots, domain reputation inspection, and heuristic and signature-based systems are used to detect these malicious activities. Recently, machine learning approaches have been proposed; however, challenges still exist. First, blocklist systems are easily evaded by new URLs and JS code content, obfuscation, fast-flux, cloaking, and URL shortening. Second, heuristic and signature-based systems do not generalize well to zero-day attacks. Third, the Domain Name System allows cybercriminals to easily migrate their malicious servers to hide their Internet protocol addresses behind domain names. Finally, crafting fully representative features is challenging, even for domain experts. This study proposes a feature selection and classification approach for malicious JS code content using Shapley additive explanations and tree ensemble methods. The JS code features are obtained from the Abstract Syntax Tree form of the JS code, sample JS attack codes, and association rule mining. The malicious and benign JS code datasets obtained from Hynek Petrak and the Majestic Million Service were used for performance evaluation. We compared the performance of the proposed method to those of other feature selection methods in the task of malicious JS code content detection. With a recall of 0.9989, our experimental results show that the proposed approach is a better prediction model.
APA, Harvard, Vancouver, ISO, and other styles
11

Kour, Kushnian, Subhashish Goswami, Dr Meenakshi Sharma, P. Thiruvannamalai Sivasankar, Dr Vipul Vekariya, and Alka Kumari. "Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 3 (2022): 163–75. http://dx.doi.org/10.17762/ijcnis.v14i3.5603.

Full text
Abstract:
Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.
APA, Harvard, Vancouver, ISO, and other styles
12

Putra, Adam, and Ade Eviyanti. "Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks." Procedia of Engineering and Life Science 3 (January 17, 2023). http://dx.doi.org/10.21070/pels.v3i0.1336.

Full text
Abstract:
At this time the internet is something that can not be separated in the life of modern society. For this reason, fast, safe and reliable internet is very important. To achieve this on the internet there are various kinds of technology that make it very influential in our lives. In the scope of security for safe and smooth internet web surfing, we need security, especially in the excess part of the website. One way to do this is to commit website crimes, namely Sql Injection. Sql injection is a hacking action that is carried out in the client application by modifying the SQL commands that are in the client application memory. SQL Injection is a technique for exploiting web applications, commands can be entered as desired by the user even though the user is not authorized to do so. The damage done by the user that can lead to fatal consequences can be done by using SQL injection. One of the methods used to prevent website security attacks is Honeypot. Honeypot is a system or computer that is deliberately used as bait to become a target for attacks from attackers.
APA, Harvard, Vancouver, ISO, and other styles
13

Masood, Mansoori, and Hunt Ray. "AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIENT HONEYPOTS IN PROTECTION OF END USERS." September 30, 2011. https://doi.org/10.5121/ijnsa.2011.3505.

Full text
Abstract:
End users are increasingly vulnerable to attacks directed at web browsers which make the most of popularity of today’s web services. While organizations deploy several layers of security to protect their systems and data against unauthorised access, surveys reveal that a large fraction of end users do not utilize and/or are not familiar with any security tools. End users’ hesitation and unfamiliarity with security products contribute vastly to the number of online DDoS attacks, malware and Spam distribution. This work on progress paper proposes a design focused on the notion of increased participation of internet service providers in protecting end users. The proposed design takes advantage of three different detection tools to identify the maliciousness of a website content and alerts users through utilising Internet Content Adaptation Protocol (ICAP) by an In-Browser cross-platform messaging system. The system also incorporates the users’ online behaviour analysis to minimize the scanning intervals of malicious websites database by client honeypots. Findings from our proof of concept design and other research indicate that such a design can provide a reliable hybrid detection mechanism while introducing low delay time into user browsing experience.  
APA, Harvard, Vancouver, ISO, and other styles
14

Artyushkin, A. "Approaches to Creating the Self-Modifying High Interaction Client Honeypots." Science and Education of the Bauman MSTU 16, no. 08 (2016). http://dx.doi.org/10.7463/0816.0844738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

"Safeguard Clothing and Dive Decrease." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S3 (2019): 1205–7. http://dx.doi.org/10.35940/ijitee.i3265.0789s319.

Full text
Abstract:
Conceptual—Security is one of the significant issues which the present progressed IoT dangers require a point by point episode reaction methodology when complex hacking assaults. This paper presents clear and particular lightweight high connection honeypot with checksum approach can examine additionally moderate undetected security dangers.Urban communities around the globe are dynamically getting to be noticeably brilliant as anyone might expect, It's been IoT (Internet of Things) to IoE (Internet of Every Thing) time, Sapless security may influence the lives of a large number of clients protection, Security and Trust. 2015 has additionally been the time of worldwide digital settlements to help hinder assaults
APA, Harvard, Vancouver, ISO, and other styles
16

Jean-François, Lalande, Rodriguez David, and Toinard Christian. "SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK." October 31, 2009. https://doi.org/10.5281/zenodo.1246367.

Full text
Abstract:
This paper proposes to address new requirements of confidentiality, integrity and availability properties fitting to peer-to-peer domains of resources. The enforcement of security properties in an open peer-topeer network remains an open problem as the literature have mainly proposed contribution on availability of resources and anonymity of users. That paper proposes a novel architecture that eases the administration of a peer-to-peer network. It considers a network of safe peer-to-peer clients in the sense that it is a commune client software that is shared by all the participants to cope with the sharing of various resources associated with different security requirements. However, our proposal deals with possible malicious peers that attempt to compromise the requested security properties. Despite the safety of an open peer-to-peer network cannot be formally guaranteed, since a end user has privileges on the target host, our solution provides several advanced security enforcement. First, it enables to formally define the requested security properties of the various shared resources. Second, it evaluates the trust and the reputation of the requesting peer by sending challenges that test the fairness of its peer-to-peer security policy. Moreover, it proposes an advanced Mandatory Access Control that enforces the required peer-to-peer security properties through an automatic projection of the requested properties onto SELinux policies. Thus, the SELinux system of the requesting peer is automatically configured with respect to the required peer-to-peer security properties. That solution prevents from a malicious peer that could use ordinary applications such as a video reader to access confidential files such as a video requesting fee paying. Since the malicious peer could try to abuse the system, SELinux challenges and traces are also used to evaluate the fairness of the requester. That paper ends with different research perspectives such as a dedicated MAC system for the peer-to-peer client and honeypots for testing the security of the proposed peer-to-peer infrastructure.  
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography