Journal ArticleDOI
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
Reads0
Chats0
TLDR
Implementation and performance plus load testing show the adaptability of the proposed honeypot-based approach and its effectiveness in reducing the probability of attacks on production computers.About:
This article is published in Computers & Security.The article was published on 2006-06-01. It has received 68 citations till now. The article focuses on the topics: Honeypot & Network security.read more
Citations
More filters
Journal ArticleDOI
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
TL;DR: Proposed cybersecurity framework uses Markov model, Intrusion Detection System (IDS), and Virtual Honeypot Device (VHD) to identify malicious edge device in fog computing environment and results indicated that proposed cybersecurity framework is successful in identifying the malicious device as well as reducing the false IDS alarm rate.
Journal ArticleDOI
Information security strategies: towards an organizational multi-strategy perspective
TL;DR: A qualitative study to determine how organizations implement security strategies to protect their information systems in Korea reveals a deeply entrenched preventive mindset, driven by the desire to ensure availability of technology and services, and a comparative ignorance of exposure to business security risks.
Journal ArticleDOI
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
TL;DR: A novel decoy and captor (D-C) based taxonomy is proposed for the purpose of studying and classifying the various honeypot techniques and two subsets of features from the taxonomy are identified, which can greatly influence the honeypot performances.
Journal ArticleDOI
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
TL;DR: This article implements three kinds of honeypots to capture malicious behaviors, including a medium-high interaction honeypot that can simulate a specific series of router UPnP services, and implemented the proposed honeynet system and deployed it in practice.
Journal ArticleDOI
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design
TL;DR: This paper proposes a novel honeypot architecture termed HoneyDOC to support all-round honeypot design and implementation, which supplies a high programmability for technically sustaining the features for capturing high-quality data.
References
More filters
Journal ArticleDOI
An Intrusion-Detection Model
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI
Intrusion detection using sequences of system calls
TL;DR: Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs.
Book
Honeypots: Tracking Hackers
TL;DR: Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology, and gains an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment.
Journal ArticleDOI
Honeycomb: creating intrusion detection signatures using honeypots
Christian Kreibich,Jon Crowcroft +1 more
TL;DR: A system for automated generation of attack signatures for network intrusion detection systems that successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.