2014 10th International Conference on Communications (COMM) 2014
DOI: 10.1109/iccomm.2014.6866707
|View full text |Cite
|
Sign up to set email alerts
|

RASSH - Reinforced adaptive SSH honeypot

Abstract: The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive hone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…They have used python to implement their working prototype. But author concluded RASSH as not fully operational and expects improvements in terms of scalabilty, coding efficiency and further optimizations of action from the honey pot in response to commands executed by attacker during the interaction [13]. Harald Gjermundrod and Ioanna Dionysiou wrote in their paper named as , "CloudHoneyCY -An Integrated Honeypot Framework for Cloud Infrastructures" , about how collection of low interaction and high interaction honey pots can be deployed in cloud environment using honey pi to provide security controlled environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They have used python to implement their working prototype. But author concluded RASSH as not fully operational and expects improvements in terms of scalabilty, coding efficiency and further optimizations of action from the honey pot in response to commands executed by attacker during the interaction [13]. Harald Gjermundrod and Ioanna Dionysiou wrote in their paper named as , "CloudHoneyCY -An Integrated Honeypot Framework for Cloud Infrastructures" , about how collection of low interaction and high interaction honey pots can be deployed in cloud environment using honey pi to provide security controlled environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The integration of incident handling, cybersecurity and machine learning is presented in other papers, such as Takahashi et al [5], Simmons et al [6] and Pauna et al [19]. They describe how Internet development leads to a widespread deployment of various IT technologies and security advances.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the integration of cloud incident handling and cybersecurity is presented in other papers, such as Takahashi et al [4], Simmons et al [5] and Pauna et al [9]. They describe how Internet development leads to a widespread deployment of various IT technologies and security advances.…”
Section: Related Workmentioning
confidence: 99%