Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at short notice. To identify such attacks as well as new cyber security threats, defenders use …
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we propose the SIPHON architecture …
System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights to explore the …
The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security a topic of serious concern. One of the most …
A Roy, DS Kim, KS Trivedi - IEEE/IFIP International Conference …, 2012 - ieeexplore.ieee.org
Constraints such as limited security investment cost precludes a security decision maker from implementing all possible countermeasures in a system. Existing analytical model …
D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a profile of attacker behavior following a remote compromise. For this experiment, we utilized …
ABSTRACT In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force password guessing attacks against SSH, FTP and telnet servers “the most common form of …
Attack models can be used to assess network security. Purely graph based attack representation models (eg, attack graphs) have a state-space explosion problem. Purely …