Mirai and its variants have demonstrated the ease and devastating effects of exploiting vulnerable Internet of Things (IoT) devices. In many cases, the exploitation vector is not …
L Huang, Q Zhu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Recent incidents such as the Colonial Pipeline ransomware attack and the SolarWinds hack have shown that traditional defense techniques are becoming insufficient to deter …
Honeypots are essential tools in cybersecurity. However, most of them (even the high- interaction ones) lack the required realism to engage and fool human attackers. This …
The Internet of things (IoT) and critical infrastructure utilizing operational technology (OT) protocols are nowadays a common attack target and/or attack surface used to further …
D Everson, L Cheng - Digital Threats: Research and Practice, 2024 - dl.acm.org
Network services are processes running on a system with network exposure. A key activity for any network defender, penetration tester, or red team is network attack surface mapping …
M Anagnostopoulos, S Lagos… - Journal of Information …, 2022 - Elsevier
Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of the available to all (open) services to flood and possibly overpower a victim's server or …
Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for …
Honeypots have been used for decades to detect, monitor, and understand attempts of unauthorized use of information systems. Previous studies focused on characterizing the …
To proactively defend computer systems against cyber-attacks, a honeypot system— purposely designed to be prone to attacks—is commonly used to detect attacks, discover …