2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2022
DOI: 10.1109/eurospw55150.2022.00033
|View full text |Cite
|
Sign up to set email alerts
|

Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Moreover, a Hindawi study introduces a method where machine learning models identify malicious activity through distinctive markers within the models, improving detection accuracy and efficiency. This approach allows for scalable and sophisticated honeypot networks by leveraging network data to mimic real-world network behaviors [19]. Because of the ease in implementing these algorithms, multiple honeypots can be on one system in what is called a honey network [14].…”
Section: The Honeypotmentioning
confidence: 99%
“…Moreover, a Hindawi study introduces a method where machine learning models identify malicious activity through distinctive markers within the models, improving detection accuracy and efficiency. This approach allows for scalable and sophisticated honeypot networks by leveraging network data to mimic real-world network behaviors [19]. Because of the ease in implementing these algorithms, multiple honeypots can be on one system in what is called a honey network [14].…”
Section: The Honeypotmentioning
confidence: 99%
“…To connect all Linux (Unix) machines to Windows machines [27], Samba enables Unix or Linux servers to communicate with Microsoft Windows protocols on a single network. The SMB protocol allows digital signature of SMB packets in order to prevent man-inthe-middle attacks that change SMB packets while they are in transit [28]. The use of digital signatures in a highly secure network helps prevent "session hijacking," which involves client PCs and servers.…”
Section: Nessus Installationmentioning
confidence: 99%
“…Among the disadvantages of these solutions, one can single out the need to purchase certain solutions, or the need to adapt the 1C:ERP UP 2 server to the requirements of 1C:Link, 1C-Connect. An alternative approach to implementing remote access without purchasing additional licences is the process of connecting to a remote server via an IPv4/IPv6 address, or using Remote Desktop Protocol (RDP) in remote application mode [4][5]. As can see from Fig.…”
Section: Introductionmentioning
confidence: 99%