Zobrazeno 1 - 10
of 23 197
pro vyhledávání: '"honeypot."'
Autor:
E. Patrick Johnson
E. Patrick Johnson's Honeypot opens with the fictional trickster character Miss B. barging into the home of Dr. EPJ, informing him that he has been chosen to collect and share the stories of her people. With little explanation, she whisks the relucta
Autor:
Otal, Hakan T., Canbaz, M. Abdullah
The rapid evolution of cyber threats necessitates innovative solutions for detecting and analyzing malicious activity. Honeypots, which are decoy systems designed to lure and interact with attackers, have emerged as a critical component in cybersecur
Externí odkaz:
http://arxiv.org/abs/2409.08234
Industrial Operational Technology (OT) systems are increasingly targeted by cyber-attacks due to their integration with Information Technology (IT) systems in the Industry 4.0 era. Besides intrusion detection systems, honeypots can effectively detect
Externí odkaz:
http://arxiv.org/abs/2410.21574
Autor:
Reworr, Volkov, Dmitrii
We introduce the LLM Honeypot, a system for monitoring autonomous AI hacking agents. We deployed a customized SSH honeypot and applied prompt injections with temporal analysis to identify LLM-based agents among attackers. Over a trial run of a few we
Externí odkaz:
http://arxiv.org/abs/2410.13919
Honeypot technologies provide an effective defense strategy for the Industrial Internet of Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security by bolstering the network intrusion detection system. For this s
Externí odkaz:
http://arxiv.org/abs/2407.02845
Autor:
Wang, Xiran a, Shi, Leyi a, ⁎, Cao, Chi a, Wu, Weixin a, Zhao, Zhihao a, Wang, Ye b, Wang, Kai b
Publikováno v:
In Computers and Electrical Engineering November 2024 119 Part B
Publikováno v:
W. Fan, Z. Du, M. Smith-Creasey, D. Fern\'andez, "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design", IEEE Journal on Selected Areas in Communications, vol. 37, issue 3, March 2019
Honeypots are designed to trap the attacker with the purpose of investigating its malicious behavior. Owing to the increasing variety and sophistication of cyber attacks, how to capture high-quality attack data has become a challenge in the context o
Externí odkaz:
http://arxiv.org/abs/2402.06516
Autor:
Dharma Kurniawan, Yuris Mulya Saputra
Publikováno v:
Journal of Internet and Software Engineering, Vol 5, Iss 2 (2024)
Dalam era digital yang semakin kompleks ini, keamanan sistem informasi menjadi masalah penting bagi organisasi di berbagai industri. Peningkatan serangan siber serta polanya yang semakin bervariatif bisa menimbulkan ancaman bagi kerahasiaan data atau
Externí odkaz:
https://doaj.org/article/8077e0c23ccf4956903383e6f0460195
Autor:
Yang, Xingyuan1,2 (AUTHOR), Yuan, Jie1,2 (AUTHOR) yuanjie@bupt.edu.cn, Yang, Hao1 (AUTHOR), Kong, Ya1 (AUTHOR), Zhang, Hao1 (AUTHOR), Zhao, Jinyu1 (AUTHOR)
Publikováno v:
Future Internet. Apr2023, Vol. 15 Issue 4, p127. 31p.