scispace - formally typeset
Journal ArticleDOI

A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks

Reads0
Chats0
TLDR
Implementation and performance plus load testing show the adaptability of the proposed honeypot-based approach and its effectiveness in reducing the probability of attacks on production computers.
About
This article is published in Computers & Security.The article was published on 2006-06-01. It has received 68 citations till now. The article focuses on the topics: Honeypot & Network security.

read more

Citations
More filters
Journal ArticleDOI

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

TL;DR: Proposed cybersecurity framework uses Markov model, Intrusion Detection System (IDS), and Virtual Honeypot Device (VHD) to identify malicious edge device in fog computing environment and results indicated that proposed cybersecurity framework is successful in identifying the malicious device as well as reducing the false IDS alarm rate.
Journal ArticleDOI

Information security strategies: towards an organizational multi-strategy perspective

TL;DR: A qualitative study to determine how organizations implement security strategies to protect their information systems in Korea reveals a deeply entrenched preventive mindset, driven by the desire to ensure availability of technology and services, and a comparative ignorance of exposure to business security risks.
Journal ArticleDOI

Enabling an Anatomic View to Investigate Honeypot Systems: A Survey

TL;DR: A novel decoy and captor (D-C) based taxonomy is proposed for the purpose of studying and classifying the various honeypot techniques and two subsets of features from the taxonomy are identified, which can greatly influence the honeypot performances.
Journal ArticleDOI

An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks

TL;DR: This article implements three kinds of honeypots to capture malicious behaviors, including a medium-high interaction honeypot that can simulate a specific series of router UPnP services, and implemented the proposed honeynet system and deployed it in practice.
Journal ArticleDOI

HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design

TL;DR: This paper proposes a novel honeypot architecture termed HoneyDOC to support all-round honeypot design and implementation, which supplies a high programmability for technically sustaining the features for capturing high-quality data.
References
More filters
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Intrusion detection using sequences of system calls

TL;DR: Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs.
Book

Honeypots: Tracking Hackers

L. Spitzner
TL;DR: Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology, and gains an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment.
Journal ArticleDOI

Honeycomb: creating intrusion detection signatures using honeypots

TL;DR: A system for automated generation of attack signatures for network intrusion detection systems that successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.