Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively
暂无分享,去创建一个
Craig Valli | Leslie Sikos | Warren Cabral | Samuel Wakeling | Warren Z. Cabral | Samuel G. Wakeling | C. Valli | L. Sikos
[1] P. S. Avadhani,et al. Honeypot System for Attacks on SSH Protocol , 2016 .
[2] Deli Liu,et al. Mimicry Honeypot: A Brief Introduction , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Bhavna Arora,et al. Honeypots and Its Deployment: A Review , 2019 .
[4] Anne H. Soukhanov,et al. The american heritage dictionary of the english language , 1992 .
[5] F. Cohen. The Use of Deception Techniques : Honeypots and Decoys , 2004 .
[6] Martin Husák,et al. Honeypots and honeynets: issues of privacy , 2017, EURASIP J. Inf. Secur..
[7] Bhojan Anand,et al. Honeynet Data Analysis and Distributed SSH Brute-Force Attacks , 2018 .
[8] Craig Valli,et al. Honeypots: How do you know when you are inside one? , 2006 .
[9] Craig Valli,et al. Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts , 2014 .
[10] Yang Wang,et al. Collecting Internet Malware Based on Client-side Honeypot , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[11] Tyrone S. Toland,et al. Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield , 2018, Computer and Network Security Essentials.
[12] Naveen K. Chilamkurti,et al. Detecting indicators of deception in emulated monitoring systems , 2018, Service Oriented Computing and Applications.
[13] Zhuo Lu,et al. Cyber Deception: Overview and the Road Ahead , 2018, IEEE Security & Privacy.
[14] Thorsten Holz,et al. Honeypots and Limitations of Deception , 2005, DFN-Arbeitstagung über Kommunikationsnetze.
[15] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[16] Mahmoud T. Qassrawi,et al. Deception Methodology in Virtual Honeypots , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[17] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..