A novel honeypot based security approach for real-time intrusion detection and prevention systems

M Baykara, R Das - Journal of Information Security and Applications, 2018 - Elsevier
In the digitalized modern world in parallel to the new technological developments,
information security has become the highest priority in the individual and institutional sense …

[PDF][PDF] A survey on potential applications of honeypot technology in intrusion detection systems

M Baykara, R Daş - International Journal of Computer Networks and …, 2015 - ijcna.org
Information security in the sense of personal and institutional has become a top priority in
digitalized modern world in parallel to the new technological developments. Many methods …

SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks

M Baykara, R Daş - Turkish Journal of Electrical Engineering …, 2019 - journals.tubitak.gov.tr
Honeypot systems are traps for intruders which simulate real systems such as web,
application, and database servers used in information systems. Using these systems …

Enhancing Cybersecurity Resilience: Integrating IDS with Advanced Honeypot Environments for Proactive Threat Detection

SA Raghul, G Gayathri, R Bhatt… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
As cyber threats evolve, conventional intrusion detection methods struggle to detect,
necessitating innovative solutions. This research study explores the transformative potential …

IPV6'da GüvenlikAçıklarınaGenelBirBakış

M Kartal, Ş Sağıroğlu, Hİ Bülbül - Politeknik Dergisi, 2013 - dergipark.org.tr
Güvenlik ve adres ihtiyacı yanı sıra daha birçok yenilik içeren ve yeni bir protokol olan IPv6,
sunduğu pek çok yeniliklerin yanı sıra bazı olumsuz yönleri de içerisinde barındırmaktadır …

[PDF][PDF] IDS with Honey Pot to Detect Man in Middle Attacks in Cloud Computing

P Satyavathi, DK Dharmaiah Devarapalli - researchgate.net
Providing security in cloud computing is challenging issue due to its distributed and multi OS
environment. Cloud security mechanisms are deployed at (Virtual Machine Monitor) VMM …