Wang et al., 2022 - Google Patents
Using honeypots to model botnet attacks on the internet of medical thingsWang et al., 2022
View PDF- Document ID
- 1492590263538221858
- Author
- Wang H
- He H
- Zhang W
- Liu W
- Liu P
- Javadpour A
- Publication year
- Publication venue
- Computers and Electrical Engineering
External Links
Snippet
Abstract Corona Virus Disease 2019 (COVID-19) has led to an increase in attacks targeting widespread smart devices. A vulnerable device can join multiple botnets simultaneously or sequentially. When different attack patterns are mixed with attack records, the security …
- 238000004422 calculation algorithm 0 abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Banerjee et al. | A blockchain future for internet of things security: a position paper | |
Rawat et al. | Association rule learning for threat analysis using traffic analysis and packet filtering approach | |
Sharma et al. | Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures | |
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
Lohachab et al. | Critical analysis of DDoS—An emerging security threat over IoT networks | |
US11509683B2 (en) | System and method for securing a network | |
Dowling et al. | A ZigBee honeypot to assess IoT cyberattack behaviour | |
US9942270B2 (en) | Database deception in directory services | |
Liao et al. | Intrusion detection system: A comprehensive review | |
Om Kumar et al. | Detecting and confronting flash attacks from IoT botnets | |
US20150326588A1 (en) | System and method for directing malicous activity to a monitoring system | |
Wang et al. | Using honeypots to model botnet attacks on the internet of medical things | |
Dodson et al. | Using global honeypot networks to detect targeted ICS attacks | |
Haseeb et al. | A measurement study of IoT-based attacks using IoT kill chain | |
Dowling et al. | New framework for adaptive and agile honeypots | |
Al-Mohannadi et al. | Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence | |
Sokolov et al. | Analysis of cybersecurity threats in cloud applications using deep learning techniques | |
Noor et al. | An intelligent context-aware threat detection and response model for smart cyber-physical systems | |
Amal et al. | H-DOCTOR: Honeypot based firewall tuning for attack prevention | |
Chandrashekar et al. | HONEYPOTS AS A PROACTIVE DEFENSE: A COMPARATIVE ANALYSIS WITH TRADITIONAL ANOMALY DETECTION IN MODERN CYBERSECURITY | |
Kanaker et al. | Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. | |
Sivamohan et al. | Efficient Multi-platform Honeypot for Capturing Real-time Cyber Attacks | |
Kontaxis et al. | Computational decoys for cloud security | |
Evans et al. | Active defense techniques | |
Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. |