Filters








3 Hits in 1.8 sec

Automatically Traceback RDP-Based Targeted Ransomware Attacks

ZiHan Wang, ChaoGe Liu, Jing Qiu, ZhiHong Tian, Xiang Cui, Shen Su
2018 Wireless Communications and Mobile Computing  
Furthermore, it also helps us trace back RDP-based ransomware attackers and ransomware makers in the practical applications.  ...  To address this problem, we propose a systematic method to fight such specifically targeted ransomware by trapping attackers via a network deception environment and then using traceback techniques to identify  ...  Acknowledgments The authors would like to thank VirusTotal for providing ransomware samples and the volunteers from the University of Chinese Academy of Sciences.  ... 
doi:10.1155/2018/7943586 fatcat:qpy4tcwkafgjbbdxpetg7o3bl4

Secure Computation on 4G/5G Enabled Internet-of-Things

Karl Andersson, Ilsun You, Rahim Rahmani, Vishal Sharma
2019 Wireless Communications and Mobile Computing  
in G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based  ...  situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks  ...  in G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based  ... 
doi:10.1155/2019/3978193 fatcat:53y6dwmzdrewhadmuswyh5uoja

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities.  ...  Honeypots and honeynets can prove essential to understand and defend against attacks on IoT, IIoT, and CPS environments by attracting attackers and deceiving them into thinking that they have gained access  ...  We provided a taxonomy of honeypots and honeynets based on purpose, role, level of interaction, scalability, resource level, availability of source code and target IoT, IIoT, or CPS application.  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq