|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi...
ver más
|
|
|
|
|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Sereysethy Touch and Jean-Noël Colin
To proactively defend computer systems against cyber-attacks, a honeypot system?purposely designed to be prone to attacks?is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real sy...
ver más
|
|
|
|
|
|
|
Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic and Richard Wortley
Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This ...
ver más
|
|
|
|
|
|
|
Razvan Florea and Mitica Craus
Cybersecurity plays an increasing role in today?s digital space, and its methods must keep pace with the changes. Both public and private sector researchers have put efforts into strengthening the security of networks by proposing new approaches. This pa...
ver más
|
|
|
|
|
|
|
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu...
ver más
|
|
|
|
|
|
|
Yang Li, Leyi Shi and Haijie Feng
A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics are c...
ver más
|
|
|
|
|
|
|
Leyi Shi, Yang Li and Haijie Feng
-
|
|
|
|
|
|
|
Carlos Enrique Montenegro,Paulo Alonso Gaona Garcia,Julio Barón Velandia. Universidad Distrital Francisco José de Caldas, Colombia
Pág. 101 - 114
Las honeynets son herramientas de seguridad informáticas muy usadas en la actualidad con el propósito de reunir información de posibles atacantes acerca de las vulnerabilidades presentes en nuestra red. Para realizar un correcto uso de ellas es necesario...
ver más
|
|
|
|