A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cloud security using self-acting spontaneous honeypots
2018
International Journal of Engineering & Technology
Also, the concept that how the instances of this honey pot can be made available as a service to the customer and how this SAS HP can be deployed with in cloud is given in this report. ...
The aim is to develop the working prototype of the proposed system in cloud environment. ...
Gerard Wagner et al in , " Adaptive and Self Configurable Honey pot", made initiatory effort to build a honeypot which is adaptive in nature . ...
doi:10.14419/ijet.v7i2.8.10418
fatcat:plh7wpnkl5effgwaydi52ub6wm
An Extensive Study of Honeypot Technique
2019
International Journal of Advanced Trends in Computer Science and Engineering
We likewise give suggestions to future honeypot programming which is progressively versatile, secluded and consolidate a dynamic insight structure. ...
Honeypots have been utilized broadly for more than two decades. Notwithstanding, their improvement is infrequently went with a comprehension of how assailants can distinguish them. ...
A cloud user may want to detect intruder's technique to intrude and may want to determine vulnerabilities in the real system. ...
doi:10.30534/ijatcse/2019/103862019
fatcat:drqkarnhi5djrnbj4stghmlomq
A First Step Towards Understanding Real-world Attacks on IoT Devices
[article]
2020
arXiv
pre-print
We deployed honeypots both on-premise and in the cloud, with associated analysis and vetting infrastructures to ensure these honeypots cannot be easily identified as such and appear to be real systems. ...
A primary condition for a honeypot to yield useful insights is to let attackers believe they are real systems used by humans and organizations. ...
We both adapt existing off-the-shelf honeypot systems and build ones from scratch to create a variety of honeypot systems for attackers to target. 2. ...
arXiv:2003.01218v1
fatcat:ey34gwllvngxdnvl7hzjsxdsga
Federated Cloud Security Architecture for Secure and Agile Clouds
[chapter]
2013
High Performance Cloud Auditing and Applications
The federated security architecture consists of a set of seamlessly integrated systematic security mechanisms at the application layer, the network layer and the system layer in federated cloud computing ...
to other layers for countermeasures; (3) it uses command and control (C2) to coordinate both in-cloud and cross-cloud defense activities via federated cloud security centers. ...
In particular, we illustrate how to blend honeypots into the IP address space of production cloud systems, which will make it harder for the attackers to identify and bypass the honeypots. • System-Layer ...
doi:10.1007/978-1-4614-3296-8_7
fatcat:g6lhiouzavd4bncl7cufiqywrq
Building and Securing Cloud-based Video Curation Service
2016
Indian Journal of Science and Technology
A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system ...
Applications: To secure the service, a dynamic honeypot can be constructed. ...
Different novel methods -such as a Dynamic honeypot or rate limiting system can be used to secure cloud based application layer services. ...
doi:10.17485/ijst/2016/v9i37/102083
fatcat:r2qubxwgerfhfpbsz7y7dukrjy
A Review on the Different Types of Honeypots in Information Security
2021
International Journal of Current Science Research and Review
Honeypotting has evolved into a crucial tool in information security analysis, despite the fact that the concept of enticing enemies in order to watch their activities is not new. ...
Honeynets, honeytokens, and adaptive honeypots are examples of recent advancements in network intrusion detection. ...
It's critical to realize that installing a honeypot will always pose some risk to the network as a whole. ...
doi:10.47191/ijcsrr/v4-i12-10
fatcat:ivvrne3h5zgpddg5o4yeyvtz6u
Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward
2021
International Journal of Advanced Trends in Computer Science and Engineering
This research paper is focused on analyzing the multi-cloud environment, intrusion detection systems and the use of honeypots in the existing solutions to understand the possible configurations for effective ...
Honeypot is a vibrant mechanism to divert attention of the unknown attackers and able to capture data to analyze the anomaly. ...
Intercloud as the second layer in cloud computing, by building more dependable cloud services and systems. ...
doi:10.30534/ijatcse/2021/1451032021
fatcat:tiqtxdmwwjeqre6muhz4yczu2i
SSH Honeypot: Building, Deploying and Analysis
2016
International Journal of Advanced Computer Science and Applications
The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. ...
Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. ...
Authors in [5] describe these as truly vulnerable systems that can be probed, attacked and exploited, once the attacker gains access to the system the honeypot can be used in a botnet or to carry out ...
doi:10.14569/ijacsa.2016.070518
fatcat:6wlpmic2nvbi3ickcv54z5trv4
Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb
2016
Procedia Computer Science
the added value of Honeypot and IDS based mobile agents, solve systems limitations intrusion detection, improve knowledge bases IDS thus increase the detection rate in our cloud environment. ...
This work proposes new cloud infrastructure architecture, which combines IDS based on mobile agent sand using three types of honeypots in order to detect attacks, to study the behavior of attackers, increase ...
The aim of [8] [9] is to explain how honeypots are used for securing cloud computing systems, their advantages and disadvantages but, regrettably, no results approved. ...
doi:10.1016/j.procs.2016.05.189
fatcat:l4lc6tfghjc5nml636w5xk2tuu
Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices
2019
Journal of Robotics, Networking and Artificial Life (JRNAL)
In this study, we explore how to build and evaluate Arduino and Raspberry Pi were used as real-world programmable logic controllers and camouflaged honeypots to simulate the honeymap of the industrial ...
Industrial control systems honeymap honeypot A B S T R A C T Under the trend of intelligent industrial control systems, it is very important to prevent network hackers from invading the system to attack ...
Jia-Wei Liao He is a B.S. student in the Department of Electrical Engineering, National Cheng Kung University, Taiwan. He was born in Taichung, Taiwan, in 1997. ...
doi:10.2991/jrnal.k.191202.008
fatcat:2epkqjtvdzeolonmg7tpbxne3u
Protocol Deployment for Employing Honeypot-as-a-Service
[chapter]
2020
IFIP Advances in Information and Communication Technology
The YAKSHA project aims at reinforcing EU-ASEAN cooperation and building partnerships in cybersecurity domain by developing a solution tailored to specific national needs leveraging EU know-how and local ...
In this paper, we consider the protocol deployment process for employing honeypot-as-a-service, with focus on the Internet of Things (IoT) use case. ...
The paper has been based on the context of the "YAKSHA" ("Cybersecurity Awareness and Knowledge Systemic High-level Application") Project, funded by the EC under the Grant Agreement (GA) No. 780498. ...
doi:10.1007/978-3-030-49190-1_10
fatcat:gnwjcbbvpjcjlklo6iuw3cldpu
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
[article]
2021
arXiv
pre-print
to the real systems. ...
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health ...
As future work, we are planning to propose novel honeypot/honeynet systems for IoT and CPS environments that build upon this survey. ...
arXiv:2108.02287v1
fatcat:l4b23mylyfd6xjtfhrtsrin3zq
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots
2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19
, and we analyze the in-the-wild traffic directed through a set of ICS-specific protocols. ...
To understand the level of interest towards Internet-connected ICS, we deploy a scalable network of low-interaction ICS honeypots based on the popular conpot framework, integrated with an analysis pipeline ...
ACKNOWLEDGMENTS This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 690972. ...
doi:10.1145/3338499.3357361
dblp:conf/ccs/FerrettiPZ19
fatcat:xgdikwwghrajnhsc3h5zhrmcie
What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering
[article]
2021
arXiv
pre-print
In this work, by observing real-world attackers' behavior in a low-interaction honeypot ecosystem, we (1) presented a new approach to creating a multi-phased, multi-faceted honeypot ecosystem, which gradually ...
Furthermore, our data analytics points to the fact that the vast majority of attack activities captured in the honeypots share significant similarity, and can be clustered and grouped to better understand ...
It actively
feasible to build one honeypot system. ...
arXiv:2112.10974v1
fatcat:nmkcktwpbvagzd43uxpvv5zxui
Securing Internet of Things(IoT) Using HoneyPots
2018
International Journal of Engineering & Technology
Here are how honeypots used to defend IoT devices from being attacked and gather information about the attackers' device. ...
In today's everlasting technological world, information and data communication create more devices stay connected to the internet. ...
In this paper, we provide a solution to verify system how KF Sensor honeypot is used to secure IoT application. ...
doi:10.14419/ijet.v7i2.7.11075
fatcat:i2uxschqa5b2jf2xnpbqirud4q
« Previous
Showing results 1 — 15 out of 955 results