[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wang et al., 2022 - Google Patents

Using honeypots to model botnet attacks on the internet of medical things

Wang et al., 2022

View PDF
Document ID
1492590263538221858
Author
Wang H
He H
Zhang W
Liu W
Liu P
Javadpour A
Publication year
Publication venue
Computers and Electrical Engineering

External Links

Snippet

Abstract Corona Virus Disease 2019 (COVID-19) has led to an increase in attacks targeting widespread smart devices. A vulnerable device can join multiple botnets simultaneously or sequentially. When different attack patterns are mixed with attack records, the security …
Continue reading at pmc.ncbi.nlm.nih.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Banerjee et al. A blockchain future for internet of things security: a position paper
Rawat et al. Association rule learning for threat analysis using traffic analysis and packet filtering approach
Sharma et al. Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Lohachab et al. Critical analysis of DDoS—An emerging security threat over IoT networks
US11509683B2 (en) System and method for securing a network
Dowling et al. A ZigBee honeypot to assess IoT cyberattack behaviour
US9942270B2 (en) Database deception in directory services
Liao et al. Intrusion detection system: A comprehensive review
Om Kumar et al. Detecting and confronting flash attacks from IoT botnets
US20150326588A1 (en) System and method for directing malicous activity to a monitoring system
Wang et al. Using honeypots to model botnet attacks on the internet of medical things
Dodson et al. Using global honeypot networks to detect targeted ICS attacks
Haseeb et al. A measurement study of IoT-based attacks using IoT kill chain
Dowling et al. New framework for adaptive and agile honeypots
Al-Mohannadi et al. Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence
Sokolov et al. Analysis of cybersecurity threats in cloud applications using deep learning techniques
Noor et al. An intelligent context-aware threat detection and response model for smart cyber-physical systems
Amal et al. H-DOCTOR: Honeypot based firewall tuning for attack prevention
Chandrashekar et al. HONEYPOTS AS A PROACTIVE DEFENSE: A COMPARATIVE ANALYSIS WITH TRADITIONAL ANOMALY DETECTION IN MODERN CYBERSECURITY
Kanaker et al. Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning.
Sivamohan et al. Efficient Multi-platform Honeypot for Capturing Real-time Cyber Attacks
Kontaxis et al. Computational decoys for cloud security
Evans et al. Active defense techniques
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.