2020
DOI: 10.1007/s40747-020-00209-5
|View full text |Cite
|
Sign up to set email alerts
|

A computational intelligence enabled honeypot for chasing ghosts in the wires

Abstract: A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation. Nonetheless, cyberattackers frequently attempt to uncover these honeypots; one of the most effective techniques for revealing their identity is a fingerprinting attack. Once identified, a honeypot can be exploited as a zombie by an attacker to attack others. Several effective techniques are available to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

4
5

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 25 publications
0
9
0
1
Order By: Relevance
“…HIHAT adalah contoh aplikasi web honeypot dengan tingkat interaksi yang tinggi. HIHAT mengubah aplikasi PHP menjadi honeypot dengan interaksi tinggi [12]. Gambar 1.…”
Section: High Interaction Honeypot (Hih)unclassified
“…HIHAT adalah contoh aplikasi web honeypot dengan tingkat interaksi yang tinggi. HIHAT mengubah aplikasi PHP menjadi honeypot dengan interaksi tinggi [12]. Gambar 1.…”
Section: High Interaction Honeypot (Hih)unclassified
“…Naik et al [65], proposed a computational intelligence honeypot system that was capable of predicting and discovering the attempted fingerprinting attack. The proposed intelligent system used two approaches Principal Component Analysis which was used to select the most important features for the prediction, and Fuzzy Inference System (FIS) which was used to correctly correlate the selected features by the Principal Component Analysis.…”
Section: Network Intrusionmentioning
confidence: 99%
“…Forensic analysis of malware requires a thorough knowledge of the degree of similarity between known malware and inert files to assess files for their threat potential. This is especially important when considering the analysis and clustering of suspected malware in order to discover new variants [19]. As a result, the use of the similarity preserving property of fuzzy hashing is useful in malware analysis while comparing unknown files with known malware families, where samples possess similar functionality, yet different cryptographic hash values [2].…”
Section: B Fuzzy Hashingmentioning
confidence: 99%