[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fujinoki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

Use of honeypots for mitigating DoS attacks targeted on IoT networks

M Anirudh, SA Thileeban… - … conference on computer …, 2017 - ieeexplore.ieee.org
Every day, a new technology comes up and the primary reason why it fails to attract many
people in this era is the concern of privacy and security. Each day, along with the new …

[PDF][PDF] Research on intrusion detection and response: A survey.

P Kabiri, AA Ghorbani - Int. J. Netw. Secur., 2005 - Citeseer
With recent advances in network based technology and increased dependability of our
every day life on this technology, assuring reliable operation of network based systems is …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Protection against denial of service attacks: A survey

G Loukas, G Öke - The Computer Journal, 2010 - ieeexplore.ieee.org
Denial of service (DoS) is a prevalent threat in today's networks because DoS attacks are
easy to launch, while defending a network resource against them is disproportionately …

Methods, media and systems for responding to a denial of service attack

A Stavrou, AD Keromytis, J Nieh, V Misra… - US Patent …, 2013 - Google Patents
Methods, media and systems for responding to a Denial of Service (DoS) attack are
provided. In some embodiments, a method includes detecting a DoS attack, migrating one or …

Detecting and confronting flash attacks from IoT botnets

CU Om Kumar, PRK Sathia Bhama - The Journal of Supercomputing, 2019 - Springer
Gone are the days when cloud providers were attacked by flash crowds causing a DoS or
malware running on a very large number of servers creating a DDoS. As the number of IoT …

A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks

H Artail, H Safa, M Sraj, I Kuwatly, Z Al-Masri - computers & security, 2006 - Elsevier
This paper proposes a hybrid and adaptable honeypot-based approach that improves the
currently deployed IDSs for protecting networks from intruders. The main idea is to deploy …

Methods, media and systems for managing a distributed application running in a plurality of digital processing devices

O Laadan, J Nieh, D Phung - US Patent 8,280,944, 2012 - Google Patents
Methods, media and systems for managing a distributed application running in a plurality of
digital processing devices are provided. In some embodiments, a method includes run ning …

Detecting application denial-of-service attacks: A group-testing-based approach

Y Xuan, I Shin, MT Thai, T Znati - IEEE Transactions on parallel …, 2009 - ieeexplore.ieee.org
Application DoS attack, which aims at disrupting application service rather than depleting
the network resource, has emerged as a larger threat to network services, compared to the …