1,102 Hits in 5.6 sec

ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot

Chun-Jung Wu, Katsunari Yoshioka, Tsutomu Matsumoto
2020 Journal of Information Processing  
In order to observe and analyze such a variety of attacks in depth, there is an increasing need for bare-metal IoT devices as a honeypot, since it is costly to emulate device-specific vulnerabilities and  ...  Besides malware, human attackers also utilize various tools to access and collect variable information on the device.  ...  Erwan Le Malecot for the critical comments and help on the network infrastructure.  ... 
doi:10.2197/ipsjjip.28.481 fatcat:xwy2g5pxcjctxa47n366nhkfsq

A honeypot-driven cyber incident monitor

Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser
2015 Proceedings of the 8th International Conference on Security of Information and Networks - SIN '15  
Cyber incident monitors are platforms utilized for supporting the tasks of network administrators and provide an initial step towards coping with the aforementioned challenges.  ...  In this paper, we present our cyber incident monitor TraC-INg. TraCINg obtains alert data from honeypot sensors distributed across all over the world.  ...  ., malware spreading, becomes more likely when analyzing attacks from several collaborating honeypots.  ... 
doi:10.1145/2799979.2799999 dblp:conf/sin/Vasilomanolakis15 fatcat:sairigomrvdijjrmontyp7fhga

GHOST Sensor: A Proactive Cyber Attack Monitoring Platform

Masashi ETO, Tomohide TANAKA, Koei SUZUKI, Mio SUZUKI, Daisuke INOUE, Koji NAKAO
2015 IEICE transactions on information and systems  
A number of network monitoring sensors such as honeypot and web crawler have been launched to observe increasinglysophisticated cyber attacks.  ...  In order to address these problems, this paper proposes a novel proactive cyber attack monitoring platform called GHOST sensor, which enables effective utilization of physical and logical resources such  ...  Therefore, a novel sensor management system is required, which utilizes monitoring IP addresses and machine resources as much as possible so that all incoming packets can be somehow analyzed.  ... 
doi:10.1587/transinf.2014icp0014 fatcat:b567ox7rnfgqppc24w67xugc6i

A Novel Approach to Cyber Hazard Management Intelligence System

B Bala Bharathi, E Suresh Babu
2018 International Journal of Engineering & Technology  
Detecting and defending against insider and outsider threats seems to be a major challenge for information security system. such that cyber-attacks pose a silent threat for a company with a havoc likely  ...  are identified using honeypot, through integration of logs for detecting network, host intrusions using SIEM technology which would efficiently manage the occurrence of threat by using cyber hazard management  ...  Some suricata rules for which are utilized for detecting probe attacks • FTP attacks Attacker requests access to ports indirectly through victim machine by using the port command as a middle man for the  ... 
doi:10.14419/ijet.v7i2.7.10866 fatcat:cmcxmg3i3nfp7puwzzqocespgy

Three Decades of Deception Techniques in Active Cyber Defense – Retrospect and Outlook [article]

Li Zhang, Vrizlynn L. L. Thing
2021 arXiv   pre-print
The taxonomy literally answers which phases of a cyber attack campaign the techniques can disrupt and which layers of the deception stack they belong to.  ...  By utilizing a tailored cyber kill chain model which can reflect the current threat landscape and a four-layer deception stack, a two-dimensional taxonomy is developed, based on which the deception techniques  ...  When attackers probe the target network for more information, deceptive responses can be utilized to confuse them and delay their progress.  ... 
arXiv:2104.03594v1 fatcat:nihxyw27dbflfmstqgskhn2jie

Network Infrastructure Vulnerabilities and Its Mitigation

Debalina Basu
2019 International Journal for Research in Applied Science and Engineering Technology  
We likewise centre around a honeypot which is a framework that is set up with the particular reason for being assaulted.  ...  Vulnerability Assessment and Penetration Testing can be utilized as a cyber-resistance innovation to give proactive cyber guard.  ...  At that point, analyzer examinations the established helplessness and make arrangement for penetration testing. Analyzer utilizes this intend to infiltrate the injured individual's system.  ... 
doi:10.22214/ijraset.2019.5314 fatcat:lkfrycupwnbx7kvb73xhcarp2e

Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study

Zhenxin Zhan, Maochao Xu, Shouhuai Xu
2013 IEEE Transactions on Information Forensics and Security  
In this paper, we propose the first statistical framework for rigorously analyzing honeypot-captured cyber attack data.  ...  The case study finds, for the first time, that Long-Range Dependence (LRD) is exhibited by honeypot-captured cyber attacks.  ...  We thank the anonymous reviewers for their comments that helped us improve the paper. This work was supported in part by ARO Grant #W911NF-13-1-0141 and AFOSR Grant #FA9550-09-1-0165.  ... 
doi:10.1109/tifs.2013.2279800 fatcat:2ynrfjcpvbfbnekoowvupx7w6e

Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study [article]

Zhenxin Zhan and Maochao Xu and Shouhuai Xu
2016 arXiv   pre-print
In this paper, we propose the first statistical framework for rigorously analyzing honeypot-captured cyber attack data.  ...  The case study finds, for the first time, that Long-Range Dependence (LRD) is exhibited by honeypot-captured cyber attacks.  ...  We thank the anonymous reviewers for their comments that helped us improve the paper. This work was supported in part by ARO Grant #W911NF-13-1-0141 and AFOSR Grant #FA9550-09-1-0165.  ... 
arXiv:1603.07433v1 fatcat:2e4hbtitazhgfbml4qig6hupyu

Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid [article]

Longfei Wei, Luis Puche Rondon, Amir Moghadasi, Arif I. Sarwat
2018 arXiv   pre-print
First, two attack surfaces are surveyed in the AMI including the communication network and smart meters. The potential cyber-physical attacks are then reviewed for each attack surface.  ...  Next, the attack models and their cyber and physical impacts on the smart grid are studied for comparison. Counter defense mechanisms that help mitigate these security threats are discussed.  ...  Game theory is expected to become a key analysis tool for analyzing cyber-physical security issues.  ... 
arXiv:1805.07422v1 fatcat:rei6zmiqhrgujlg3d5ffg32axe

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem [chapter]

Erol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu, George Lyberopoulos
2013 Lecture Notes in Electrical Engineering  
NEMESYS will gather and analyze information about the nature of cyber-attacks targeting mobile users and the mobile network so that appropriate counter-measures can be taken.  ...  We will develop a data collection infrastructure that incorporates virtualized mobile honeypots and a honeyclient, to gather, detect and provide early warning of mobile attacks and better understand the  ...  Traditional honeypots are servers that passively wait to be attacked, whereas client honeypots are security devices that actively search for malware, compromised websites and other forms of attacks.  ... 
doi:10.1007/978-3-319-01604-7_36 fatcat:iyy5xakx2jcrnp25yqd7ebgcle

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Murat Odemis, Cagatay Yucel, Ahmet Koltuksuz, Konstantinos Demertzis
2022 Security and Communication Networks  
The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research.  ...  To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature.  ...  has been typing on the server or automation is utilized, and the level of sophistication for the exploration of the attacker on the honeypot. ese characteristics about the attackers can be crafted into  ... 
doi:10.1155/2022/7620125 fatcat:bpcghxc7lfeebkwvgznz5wx5sa

A Symbolic Honeynet Framework for SCADA System Threat Intelligence [chapter]

Owen Redwood, Joshua Lawrence, Mike Burmester
2015 IFIP Advances in Information and Communication Technology  
Typically honeypots utilize intrusion detection systems to detect attacks.  ...  Researchers at Harvard and Los Alamos National Laboratory have developed the RobotOS (ROS) honeypot [14] , the first true cyber-physical honeypot that utilizes real robotic hardware as the target.  ... 
doi:10.1007/978-3-319-26567-4_7 fatcat:6lfut5gqx5cyfcngjgarw25ery

Medium interaction honeypot for network security to detect cyber attacks

K. S. Dhanalakshmi, V. BabyShalini
2021 3C Tecnología  
To overcome this, a framework of honeypot is made virtually with Medium Interaction by utilizing Kali Linux on Raspberry Pi3.  ...  Also, this setup can able to find DoS attack effectively which is created by the attacker.  ...  The intrusion was given by the various devices and the response given by the honeypot was presented and analyzed. Anyway, this framework is now implemented for the small network.  ... 
doi:10.17993/3ctecno.2021.specialissue8.397-409 fatcat:4e2gexgbtvexbd24o3hyvdln5a

Federated Cloud Security Architecture for Secure and Agile Clouds [chapter]

Weiliang Luo, Li Xu, Zhenxin Zhan, Qingji Zheng, Shouhuai Xu
2013 High Performance Cloud Auditing and Applications  
Features of the architecture include: (1) it is centered on proactive cyber defense; (2) it facilitates to detect early warning cyber attacks against at one layer and deploy early warning signs of attacks  ...  Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds.  ...  This is important because without diversifying honeypot personalities, a sophisticated attacker can recognize honeypots by analyzing the characteristics of the honeypots.  ... 
doi:10.1007/978-1-4614-3296-8_7 fatcat:g6lhiouzavd4bncl7cufiqywrq

A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning

Nadiya El Kamel, Mohamed Eddabbah, Youssef Lmoumen, Raja Touahni
2020 Security and Communication Networks  
In this paper, we present an introduction of machine learning and honeypot systems, and based on these technologies, we design a smart agent for cyber-attack prevention and prediction.  ...  To deal with 0-day and future attacks, the honeypot technique can be used not only passively as an information system, but also to reinforce the traditional defense systems against future attacks.  ...  4 ) or dedicated to honeypot, while the firewall only allows incoming flows to pass through to the DMZ for available services. is makes it possible to analyze only attempted attacks for the services in  ... 
doi:10.1155/2020/8865474 fatcat:daepvtw72zgmhifyxmd5f4px6q
« Previous Showing results 1 — 15 out of 1,102 results