Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "honeypot" wg kryterium: Temat


Wyświetlanie 1-5 z 5
Tytuł:
Management and analytical software for data gathered from HoneyPot system
Autorzy:
Cabaj, K.
Denis, M.
Buda, M.
Powiązania:
https://bibliotekanauki.pl/articles/94827.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
HoneyPot systems
data mining
monitoring
systemy honeypot
Opis:
The paper describes details concerning systems used for analysis and the result of data gathered from two various HoneyPot systems, implemented at Institute of Computer Science. The first system uses data mining techniques for the automatic discovery of interesting patterns in connections directed to the HoneyPot. The second one is responsible for the collection and the initial analysis of attacks dedicated to the Web applications, which nowadays is becoming the most interesting target for cybercriminals. The paper presents results from almost a year of usage, with implemented prototypes, which prove it's practical usefulness. The person performing analysis improves effectiveness by using potentially useful data, which is initially filtered from noise, and automatically generated reports. The usage of data mining techniques allows not only detection of important patterns in rapid manner, but also prevents from overlooking interesting patterns in vast amounts of other irrelevant data.
Źródło:
Information Systems in Management; 2013, 2, 3; 182-193
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Visualization as support for web honeypot data analysis
Autorzy:
Cabaj, K.
Powiązania:
https://bibliotekanauki.pl/articles/94737.pdf
Data publikacji:
2015
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
HoneyPot systems
visualization
data mining
monitoring
systemy honeypot
wizualizacja
Opis:
The paper presents methodologies associated with visualization, which supports data analysis. Analyzed data has been gathered by HoneyPot systems deployed in the network of Institute of Computer Science. Due to the vast amounts of data, the manual analysis was almost impossible and very impractical, also considering time constraints. Introduced visualization techniques and supporting filtering features are implemented in HPMS (HoneyPot Management System). The paper describes in details two introduced methodologies which support data analysis using both charts and graphs. The first one is used for the discovery of basic activities observed by HoneyPot. The second one is used for advanced analysis of machines used during attacks concerning PhpMyAdmin software.
Źródło:
Information Systems in Management; 2015, 4, 1; 14-25
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Honeypot
HONEYPOT
Autorzy:
Kreft, Karol
Powiązania:
https://bibliotekanauki.pl/articles/419075.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Gdański. Wydział Ekonomiczny
Tematy:
information security
computer network protection
honeypot working
Opis:
In the article, the principles of computer network protection using the honeypot technology were presented. Honeypots are systems of traps, which are a powerful weapon in the hands of IT security specialists. The author described types and concepts of operation of honeypots.
Źródło:
Współczesna Gospodarka; 2011, 2, 1; 13-22
2082-677X
Pojawia się w:
Współczesna Gospodarka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intrusion Detection in Heterogeneous Networks of Resource-Limited Things
Autorzy:
Kozakiewicz, A.
Lasota, K.
Marks, M.
Powiązania:
https://bibliotekanauki.pl/articles/307880.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
client honeypot
internet of things (IoT)
intrusion detection
wireless sensor network
Opis:
The paper discusses the threats to networks of resource-limited things such as wireless sensors and the different mechanisms used to deal with them. A novel approach to threat detection is proposed. MOTHON is a movement-assisted threat detection system using mobility to enhance a global threat assessment and provide a separate physical secure channel to deliver collected information.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 4; 10-14
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process
Autorzy:
Wang, Lidong
Mosher, Reed
Duett, Patti
Falls, Terril
Powiązania:
https://bibliotekanauki.pl/articles/27304921.pdf
Data publikacji:
2023
Wydawca:
NASK - National Research Institute
Tematy:
cybersecurity
honeypot
machine learning
Markov decision process
Q-learning
cyberbezpieczeństwo
uczenie maszynowe
proces decyzyjny Markowa
Opis:
A honeypot is used to attract and monitor attacker activities and capture valuable information that can be used to help practice good cybersecurity. Predictive modelling of a honeypot system based on a Markov decision process (MDP) and a partially observable Markov decision process (POMDP) is performed in this paper. Analyses over a finite planning horizon and an infinite planning horizon for a discounted MDP are respectively conducted. Four methods, including value iteration (VI), policy iteration (PI), linear programming (LP), and Q-learning, are used in the analyses over an infinite planning horizon for the discounted MDP. The results of the various methods are compared to evaluate the validity of the created MDP model and the parameters in the model. The optimal policy to maximise the total expected reward of the states of the honeypot system is achieved, based on the MDP model employed. In the modelling over an infinite planning horizon for the discounted POMDP of the honeypot system, the effects of the observation probability of receiving commands, the probability of attacking the honeypot, the probability of the honeypot being disclosed, and transition rewards on the total expected reward of the honeypot system are studied.
Źródło:
Applied Cybersecurity & Internet Governance; 2023, 2, 1; 1-14
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies