Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Seamus Dowling"'
Publikováno v:
ETRI Journal, Vol 42, Iss 6, Pp 965-975 (2020)
This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack su
Externí odkaz:
https://doaj.org/article/2727fda4c541487ca5f9baea1fe3ada1
Publikováno v:
2022 Cyber Research Conference - Ireland (Cyber-RCI).
Autor:
Gerard Reynolds, Seamus Dowling
Publikováno v:
2022 Cyber Research Conference - Ireland (Cyber-RCI).
Publikováno v:
2022 Cyber Research Conference - Ireland (Cyber-RCI).
Publikováno v:
ETRI Journal, Vol 42, Iss 6, Pp 965-975 (2020)
This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack su
Publikováno v:
Journal of Cyber Security Technology. 2:75-91
This paper presents an intelligent honeypot that uses reinforcement learning to proactively engage with and learn from attacker interactions. It adapts its behaviour for automated malware t...
Publikováno v:
Machine Learning and Knowledge Discovery in Databases ISBN: 9783030109967
ECML/PKDD (3)
ECML/PKDD (3)
Automated malware employ honeypot detecting mechanisms within its code. Once honeypot functionality has been exposed, malware such as botnets will cease the attempted compromise. Subsequent malware variants employ similar techniques to evade detectio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2c2a55545273113bbb9633aabd2f89ad
https://doi.org/10.1007/978-3-030-10997-4_21
https://doi.org/10.1007/978-3-030-10997-4_21
Publikováno v:
ICITST
Honeypots are deployed to capture cyber attack data for analysis of attacker behavior. This paper analyses a honeypot dataset to establish attack types and corresponding temporal patterns. It calculates the probability of each attack type occurring a
Publikováno v:
2017 28th Irish Signals and Systems Conference (ISSC).
Wireless Personal Area Networks (WPAN) allow for the implementation of applications such as home automation, remote control services, near-field technologies and personal health care management. Security is a critical requirement of the standards and
Publikováno v:
2017 Smart City Symposium Prague (SCSP).
A smart city system will contain diverse heterogeneous smart objects. Their complexity will range from simple reduced function devices (RFD) acting as common nodes, to full function devices (FFD) acting as coordinators and controlling actuators. As p