Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Jione Choi"'
Publikováno v:
IEEE Access, Vol 8, Pp 32203-32214 (2020)
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works
Externí odkaz:
https://doaj.org/article/5da237a5714f43b9aca205aaa96d981c
Autor:
Jione Choi, Hwiwon Lee, Younggi Park, Huy Kang Kim, Junghee Lee, Youngjae Kim, Gyuho Lee, Shin-Woo Shim, Taekyu Kim
Publikováno v:
IEEE Access, Vol 8, Pp 198285-198300 (2020)
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques. Especially, a file-based deceptio
Externí odkaz:
https://doaj.org/article/821ab3c4e88f4bac9e0731e9a4e7a141
Publikováno v:
IEEE Access, Vol 8, Pp 32203-32214 (2020)
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works
Autor:
Huy Kang Kim, Younggi Park, Jione Choi, Junghee Lee, Gyuho Lee, Shinwoo Shim, Taekyu Kim, Youngjae Kim, Hwiwon Lee
Publikováno v:
IEEE Access, Vol 8, Pp 198285-198300 (2020)
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques. Especially, a file-based deceptio