Meta-review of recent and landmark honeypot research and surveys

G Ikuomenisan, Y Morgan - Journal of Information Security, 2022 - scirp.org
The growing interest in Honeypots has resulted in increased research, and consequently, a
large number of research surveys and/or reviews. Most Honeypot surveys and/or reviews …

Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System

T Ernawati, FFF Rachmat - Jurnal RESTI (Rekayasa Sistem dan …, 2021 - jurnal.iaii.or.id
Computer network systems have been designing to share resources. Sharing resources
process, data security, and confidentiality are main issues in anticipating misuse of the …

IMPLEMENTASI HONEYPOT COWRIE DAN SNORT SEBAGAI ALAT DETEKSI SERANGAN PADA SERVER

T Natanegara, Y Muhyidin… - JATI (Jurnal Mahasiswa …, 2023 - ejournal.itn.ac.id
Internet telah membantu orang berbagi informasi, tetapi tidak semua informasi terbuka dan
tersedia secara bebas. Ada user yang mencoba membuka informasi tersebut meskipun …

Sonification of information security incidents in an organization using a multistep cooperative game model

A Vishnevsky, N Abbas - World Conference on Information Systems and …, 2022 - Springer
This work is devoted to the development of computer attacks detection tool with a sound
interface. Information security tools transmit visual signals to characterize the behavior of …

Обнаружение целенаправленных атак веб-ориентированной обманной системой, основанной на алгоритме антиклассификации

АС Вишневский, ПГ Ключарев - Нейрокомпьютеры: разработка …, 2020 - elibrary.ru
Постановка проблемы. Обманные системы-информационные ресурсы, собирающие
сведения о направленных на них компьютерных атаках. Злоумышленники перед …

E-mail: andrey. s. vishnevsky@ gmail. com PG Klyucharev–Ph. D.(Tech.), Associate Professor, Information Security Department, Faculty of Informatics and Control …

AS Vishnevsky - radiotec.ru
The purpose of the article is to develop honeypot behavior algorithm which disguises it as
real information resource and determines if an adversary attacks specific person …