Academic literature on the topic 'Low interaction honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Low interaction honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Low interaction honeypots"
Touch, Sereysethy, and Jean-Noël Colin. "A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots." Applied Sciences 12, no. 10 (May 21, 2022): 5224. http://dx.doi.org/10.3390/app12105224.
Full textPortokalidis, Georgios, and Herbert Bos. "SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots." Computer Networks 51, no. 5 (April 2007): 1256–74. http://dx.doi.org/10.1016/j.comnet.2006.09.005.
Full textArkaan, Naufal, and Dolly Virgian Shaka Yudha Sakti. "Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH." Jurnal Nasional Teknologi dan Sistem Informasi 5, no. 2 (September 19, 2019): 112. http://dx.doi.org/10.25077/teknosi.v5i2.2019.112.
Full textArkaan, Naufal, and Dolly Virgian Shaka Yudha Sakti. "Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH." Jurnal Nasional Teknologi dan Sistem Informasi 5, no. 2 (September 19, 2019): 112–20. http://dx.doi.org/10.25077/teknosi.v5i2.2019.112-120.
Full textRizvi, Syed Khurram Jah, Warda Aslam, Muhammad Shahzad, Shahzad Saleem, and Muhammad Moazam Fraz. "PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable." Complex & Intelligent Systems 8, no. 1 (October 12, 2021): 673–85. http://dx.doi.org/10.1007/s40747-021-00560-1.
Full textNURILAHI, DESI KURNIA, RIZAL MUNADI, SYAHRIAL SYAHRIAL, and AL BAHRI. "Penerapan Metode Naïve Bayes pada Honeypot Dionaea dalam Mendeteksi Serangan Port Scanning." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 10, no. 2 (April 12, 2022): 309. http://dx.doi.org/10.26760/elkomika.v10i2.309.
Full textMarzuqon, Mokhamad Wildan, and Agus Prihanto. "Analisis Perbandingan Behavior User Menggunakan Low Interaction Honeypot dan IDS pada Sistem Edge Computing." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (June 29, 2022): 471–80. http://dx.doi.org/10.26740/jinacs.v3n04.p471-480.
Full textDurairajan, M. S., R. Saravanan, and S. Sibi Chakkaravarthy. "Low Interaction Honeypot: A Defense Against Cyber Attacks." Journal of Computational and Theoretical Nanoscience 13, no. 8 (August 1, 2016): 5446–53. http://dx.doi.org/10.1166/jctn.2016.5437.
Full textNyamugudza, Tendai, Venkatesh Rajasekar, Prasad Sen, M. Nirmala, and V. Madhu Viswanatham. "Network traffic intelligence using a low interaction honeypot." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 042096. http://dx.doi.org/10.1088/1757-899x/263/4/042096.
Full textMispriatin, Melia, Jaffaruddin Gusti Amri Ginting, and Bongga Arifwidodo. "Analisis Kinerja Honeypot Dionaea Dan Cowrie Dalam Mendeteksi Serangan." Prosiding Seminar Nasional Teknoka 6 (January 1, 2022): 170–78. http://dx.doi.org/10.22236/teknoka.v6i1.448.
Full textDissertations / Theses on the topic "Low interaction honeypots"
Chairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Full textPonten, Austin. "Evaluation of Low-Interaction Honeypots on the University Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66885.
Full textAlmotairi, Saleh Ibrahim Bakr. "Using honeypots to analyse anomalous Internet activities." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/31833/1/Saleh_Almotairi_Thesis.pdf.
Full textFrederick, Erwin E. "Testing a low-interaction honeypot against live cyber attackers." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5600.
Full textThe development of honeypots as decoys designed to detect, investigate, and counterattack unauthorized use of information systems has produced an "arms race" between honeypots (computers designed solely to receive cyber attacks) and anti-honeypot technology. To test the current state of this race, we performed experiments in which we ran a small group of honeypots, using the low-interaction honeypot software Honeyd, on a network outside campus firewall protection. For 15 weeks, we ran different configurations of ports and service scripts, and simulated operating systems to check which configurations were most useful as a research honeypot and which were most useful as decoys to protect other network users. We analyzed results in order to improve the results for both purposes in subsequent weeks. We did find promising configurations for both purposes; however, good configurations for one purpose were not necessarily good for the other. We also tested the limits of Honeyd software and identified aspects of it that need to be improved. We also identified the most common attacks, most common ports used by attackers, and degree of success of decoy service scripts.
Book chapters on the topic "Low interaction honeypots"
Vidal-González, Sergio, Isaías García-Rodríguez, Héctor Aláiz-Moretón, Carmen Benavides-Cuéllar, José Alberto Benítez-Andrades, María Teresa García-Ordás, and Paulo Novais. "Analyzing IoT-Based Botnet Malware Activity with Distributed Low Interaction Honeypots." In Trends and Innovations in Information Systems and Technologies, 329–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45691-7_30.
Full textSokol, Pavol, Matej Zuzčák, and Tomáš Sochor. "Definition of Attack in the Context of Low-Level Interaction Server Honeypots." In Computer Science and its Applications, 499–504. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45402-2_74.
Full textZakari, Abubakar, Abdulmalik Ahmad Lawan, and Girish Bekaroo. "Towards Improving the Security of Low-Interaction Honeypots: Insights from a Comparative Analysis." In Emerging Trends in Electrical, Electronic and Communications Engineering, 314–21. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52171-8_28.
Full textShi, Jing, Mingyang Chen, and Jiazheng Jiao. "Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP." In Lecture Notes in Computer Science, 144–56. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06791-4_12.
Full text"Distributed Low-Interaction Honeypot System to Detect Botnets." In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011), 413–20. ASME Press, 2011. http://dx.doi.org/10.1115/1.859735.paper66.
Full textJorquera Valero, José María, Manuel Gil Pérez, Alberto Huertas Celdrán, and Gregorio Martínez Pérez. "Identification and Classification of Cyber Threats Through SSH Honeypot Systems." In Handbook of Research on Intrusion Detection Systems, 105–29. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch006.
Full textConference papers on the topic "Low interaction honeypots"
Badrul Anuar, Nor, Omar Zakaria, and Chong Wei Yao. "Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2955.
Full textMukkamala, S., K. Yendrapalli, R. Basnet, M. K. Shankarapani, and A. H. Sung. "Detection of Virtual Environments and Low Interaction Honeypots." In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381919.
Full textMusch, Marius, Martin Härterich, and Martin Johns. "Towards an Automatic Generation of Low-Interaction Web Application Honeypots." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3230839.
Full textNaik, Nitin, Paul Jenkins, Roger Cooke, and Longzhi Yang. "Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots." In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE, 2018. http://dx.doi.org/10.1109/fuzz-ieee.2018.8491456.
Full textFronimos, D., E. Magkos, and V. Chrissikopoulos. "Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats." In the 18th Panhellenic Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2645791.2645850.
Full textAndrew, Daniel, and Hongmei Chi. "An empirical study of botnets on university networks using low-interaction honeypots." In the 51st ACM Southeast Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2498328.2500094.
Full textFerretti, Pietro, Marcello Pogliani, and Stefano Zanero. "Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots." In the ACM Workshop. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3338499.3357361.
Full textAkiyoshi, Ryoh, Daisuke Kotani, and Yasuo Okabe. "Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet." In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.10314.
Full textNaik, Nitin, and Paul Jenkins. "A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots." In 2018 International Conference on Information Fusion (FUSION). IEEE, 2018. http://dx.doi.org/10.23919/icif.2018.8455555.
Full text"HoneydV6: A Low-interaction IPv6 Honeypot." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004515100860097.
Full text