Autoencoder-based feature construction for IoT attacks clustering

J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf… - Future Generation …, 2022 - Elsevier
Variations in commands executed as part of the attack process can be used to determine the
behavioural patterns of IoT attacks. Existing approaches rely on the domain knowledge of …

A highly interactive honeypot-based approach to network threat management

X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …

On designing low-risk honeypots using generative pre-trained transformer models with curated inputs

J Ragsdale, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
Honeypots are utilized as defensive tools within a monitored environment to engage
attackers and gather artifacts for the development of indicators of compromise. However …

HoneyKube: designing a honeypot using microservices-based architecture

C Gupta - 2021 - essay.utwente.nl
Since before the pandemic, there has been a gradual rise in the dependency on online
applications. Examples include e-commerce, social media and digital conferencing. This …

[PDF][PDF] Detection and Analysis of Active Attacks using Honeypot

W Ahmad, MA Raza, S Nawaz… - International Journal of …, 2023 - researchgate.net
Honeypots are computer systems specifically deployed to deceive attackers so that they
consider them legitimate computers. Honeypots are actually a trap to trick the attackers so …

Honeykube: designing and deploying a microservices-based web honeypot

C Gupta, T Van Ede, A Continella - 2023 IEEE Security and …, 2023 - ieeexplore.ieee.org
Over the past few years, we have witnessed a radical change in the architectures and
infrastructures of web applications. Traditional monolithic systems are nowadays getting …

Application Layer Cyber Deception without Developer Interaction

M Kahlhofer, S Rass - arXiv preprint arXiv:2405.12852, 2024 - arxiv.org
Cyber deception techniques that are tightly intertwined with applications pose significant
technical challenges in production systems. Security measures are usually the responsibility …

Probabilistic modelling of deception-based security framework using markov decision process

J Haseeb, SUR Malik, M Mansoori, I Welch - Computers & Security, 2022 - Elsevier
Existing studies using deception are ad-hoc attempts and few theoretical models have been
designed to plan and integrate deception. We theorise that a pre-planning stage should be a …

Deception-based security framework for iot: An empirical study

J Haseeb - 2023 - openaccess.wgtn.ac.nz
A large number of Internet of Things (IoT) devices in use has provided a vast attack surface.
The security in IoT devices is a significant challenge considering constrained resources …

Vulnerability Assessment Tools for IoT: An Agile Approach

P Anand, Y Singh - Agile Software Development: Trends …, 2023 - Wiley Online Library
Smart services being more high‐handed than ever before increased the security
contemplations which faded with growing divergence in threat variants and IoT devices. To …