2015 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2015
DOI: 10.1109/hpcsim.2015.7237039
|View full text |Cite
|
Sign up to set email alerts
|

A honeypot system with honeyword-driven fake interactive sessions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
3

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 28 publications
0
13
0
3
Order By: Relevance
“…Hence, if ( ) , then the authentication succeeds, and the honeychecker will send back its "approval", whilst otherwise an alarm is triggered, as the password file has probably been attacked. Table I illustrates the related notation [14].…”
Section: Review Of Honeywordsmentioning
confidence: 99%
“…Hence, if ( ) , then the authentication succeeds, and the honeychecker will send back its "approval", whilst otherwise an alarm is triggered, as the password file has probably been attacked. Table I illustrates the related notation [14].…”
Section: Review Of Honeywordsmentioning
confidence: 99%
“…Dimana port knocking dapat mengontrol layanan port terbuka dan port tertutup [1]. Selain menggunakan metode port knocking dibutuhkan honeypot untuk mengalihkan attacker kedalam server tiruan dan mendeteksi serangan apa saja yang dilakukan oleh attacker/intruder pada server [2]. Pada penelitian sebelumnya port knocking belum dikombinasikan dengan honeypot, port knocking hanya digunakan untuk menyembunyikan port, dan dapat berjalan dengan baik pada Virtual Debian Versi 6.0.1 [3].…”
Section: Pendahuluanunclassified
“…However, the virtual honeypot can be perceived by attackers because it cannot provide the completely real environment of system, and the information provided by a single or multiple virtual honeypots is not enough to reflect the whole feature of intrusion. For the former, the highly interactive honeypots are proposed to give attackers the adequate feedbacks of information [29,30]. For the latter, the distributed honey-net system is set up to provide more accurate attacking report under circumstance of highly cooperating between virtual honeypots [31,32].…”
Section: Related Workmentioning
confidence: 99%