17   Artículos

 
en línea
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao    
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer    
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sereysethy Touch and Jean-Noël Colin    
To proactively defend computer systems against cyber-attacks, a honeypot system?purposely designed to be prone to attacks?is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real sy... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic and Richard Wortley    
Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Razvan Florea and Mitica Craus    
Cybersecurity plays an increasing role in today?s digital space, and its methods must keep pace with the changes. Both public and private sector researchers have put efforts into strengthening the security of networks by proposing new approaches. This pa... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu    
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yang Li, Leyi Shi and Haijie Feng    
A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics are c... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Leyi Shi, Yang Li and Haijie Feng    
-
Revista: Information    Formato: Electrónico

 
en línea
Carlos Enrique Montenegro,Paulo Alonso Gaona Garcia,Julio Barón Velandia. Universidad Distrital Francisco José de Caldas, Colombia     Pág. 101 - 114
Las honeynets son herramientas de seguridad informáticas muy usadas en la actualidad con el propósito de reunir información de posibles atacantes acerca de las vulnerabilidades presentes en nuestra red. Para realizar un correcto uso de ellas es necesario... ver más
Revista: Logos Ciencia & TecnologÍ­a    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »