Zobrazeno 1 - 10
of 3 450
pro vyhledávání: '"honeypot."'
Autor:
Dharma Kurniawan, Yuris Mulya Saputra
Publikováno v:
Journal of Internet and Software Engineering, Vol 5, Iss 2 (2024)
Dalam era digital yang semakin kompleks ini, keamanan sistem informasi menjadi masalah penting bagi organisasi di berbagai industri. Peningkatan serangan siber serta polanya yang semakin bervariatif bisa menimbulkan ancaman bagi kerahasiaan data atau
Externí odkaz:
https://doaj.org/article/8077e0c23ccf4956903383e6f0460195
Publikováno v:
Teknika, Vol 13, Iss 1, Pp 77-85 (2024)
A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the existence of honeypots using various other software
Externí odkaz:
https://doaj.org/article/5b31c4ff871c4466aecea8d1d71d6003
Autor:
Mohd Faris Mohd Fuzi, Muhammad Fahimuddin Mazlan, Muhammad Nabil Fikri Jamaluddin, Iman Hazwam Abd Halim
Publikováno v:
Journal of Computing Research and Innovation, Vol 9, Iss 2 (2024)
Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on ru
Externí odkaz:
https://doaj.org/article/b9390d80fea742108d1cf4bd902ebe83
Autor:
Parthasarathy Ramadass, Raja shree Sekar, Saravanan Srinivasan, Sandeep Kumar Mathivanan, Basu Dev Shivahare, Saurav Mallik, Naim Ahmad, Wade Ghribi
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100515- (2024)
The surge in Distributed Denial of Service (DDoS) attacks within SDN environments demands more potent defense strategies. While Moving Target Defense (MTD) holds promise, current MTD approaches against DDoS suffer from security gaps due to overwhelmi
Externí odkaz:
https://doaj.org/article/e360a5bfe95345be9fd164cacf4b1b31
Autor:
Wang, Xiran a, Shi, Leyi a, ⁎, Cao, Chi a, Wu, Weixin a, Zhao, Zhihao a, Wang, Ye b, Wang, Kai b
Publikováno v:
In Computers and Electrical Engineering November 2024 119 Part B
Autor:
Venny Gustina DM, Ananda Ananda
Publikováno v:
Jurnal Komputer Terapan, Vol 10, Iss 1 (2024)
Integrasi kecerdasan buatan (AI) dalam Security Orchestration, Automation, and Response (SOAR) menjanjikan revolusi dalam operasi keamanan siber. Adopsi teknologi SOAR yang didukung AI dapat membantu organisasi meningkatkan ketahanan mereka terhadap
Externí odkaz:
https://doaj.org/article/521b22952912458c8cc7be707877e37a
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110496- (2024)
The proliferation of Internet of Things devices has ushered in a new era of connectivity and con-venience, yet it has also exposed a myriad of security challenges, with Distributed Denial of Service attacks posing a significant threat. This paper int
Externí odkaz:
https://doaj.org/article/ae1e9cc0473546aebfa8f3e8506ded86
Autor:
Achile Leonel Nguemkam, Ahmed Hemida Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles Kamhoua
Publikováno v:
IEEE Access, Vol 12, Pp 187444-187455 (2024)
This paper presents a scalable solution for zero-sum, one-sided, partially observable stochastic games (Z-POSGs) in the realm of cybersecurity. Existing heuristic search value iteration (HSVI) methods often face significant challenges with scalabilit
Externí odkaz:
https://doaj.org/article/c18fdf3ad3da4b6ea88bd2cf2ac726a3
Publikováno v:
IEEE Access, Vol 12, Pp 144579-144587 (2024)
The research area of honeypots is gaining new momentum, driven by advancements in large language models (LLMs). The chat-based applications of generative pretrained transformer (GPT) models seem ideal for the use as honeypot backends, especially in r
Externí odkaz:
https://doaj.org/article/17434d89860d419993a4fb5d27a65e1d
Publikováno v:
IEEE Access, Vol 12, Pp 128929-128940 (2024)
The combination of Software-Defined Networking (SDN) with Unmanned Aerial Vehicles (UAVs) has transformed wireless communication and data transmission. However, this advancement introduces new security challenges, specifically Distributed Denial of S
Externí odkaz:
https://doaj.org/article/d956e8a3048c404da4e9655b6a6c6872