Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation

[1]  Jie Li,et al.  Towards sparse rule base generation for fuzzy rule interpolation , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[2]  Nitin Naik,et al.  D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[3]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[4]  Ying Li,et al.  Fuzzy Rule Based Interpolative Reasoning Supported by Attribute Ranking , 2018, IEEE Transactions on Fuzzy Systems.

[5]  Nitin Naik,et al.  Genetic algorithm-aided dynamic fuzzy rule interpolation , 2014, 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[6]  Tossapon Boongoen,et al.  Extending Data Reliability Measure to a Filter Approach for Soft Subspace Clustering , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Nitin Naik,et al.  Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[8]  Qiang Shen,et al.  Fuzzy interpolative reasoning via scale and move transformations , 2006, IEEE Transactions on Fuzzy Systems.

[9]  Nitin Naik,et al.  Discovering Hackers by Stealth: Predicting Fingerprinting Attacks on Honeypot Systems , 2018, 2018 IEEE International Systems Engineering Symposium (ISSE).

[10]  Nitin Naik,et al.  A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[11]  Nitin Naik,et al.  Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[12]  Fei Chao,et al.  Generalized Adaptive Fuzzy Rule Interpolation , 2017, IEEE Transactions on Fuzzy Systems.

[13]  Qiang Shen,et al.  Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection , 2018, IEEE Transactions on Fuzzy Systems.

[14]  Pan Su,et al.  Aberystwyth University Induction of accurate and interpretable fuzzy rules from preliminary crisp representation , 2018 .

[15]  Lloyd G. Greenwald,et al.  Toward Undetected Operating System Fingerprinting , 2007, WOOT.

[16]  Nitin Naik,et al.  Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).

[17]  Qiang Shen,et al.  Nature inspired feature selection meta-heuristics , 2015, Artificial Intelligence Review.

[18]  Nitin Naik,et al.  Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[19]  Tossapon Boongoen,et al.  Disclosing false identity through hybrid link analysis , 2010, Artificial Intelligence and Law.

[20]  Neil C. Rowe,et al.  Measuring the Effectiveness of Honeypot Counter-Counterdeception , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[21]  Nitin Naik,et al.  Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).

[22]  Qiang Shen,et al.  New Approaches to Fuzzy-Rough Feature Selection , 2009, IEEE Transactions on Fuzzy Systems.

[23]  Jie Li,et al.  An extended Takagi–Sugeno–Kang inference system (TSK+) with fuzzy interpolation and its rule base generation , 2018, Soft Comput..