2017
DOI: 10.1109/tcss.2017.2719705
|View full text |Cite
|
Sign up to set email alerts
|

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 27 publications
0
26
0
Order By: Relevance
“…Existing detection methods mainly aim at detecting attacks in social network by a series of abnormal states of accounts, the content of messages, or the social relationship of users. There are little related works in the early stages of attacks in social network [20,[23][24][25], and our approach is primarily aimed at the reconnaissance stage of the attack. At this stage, the attacker collects and analyzes users' information and selects the appropriate attack target and method.…”
Section: Related Workmentioning
confidence: 99%
“…Existing detection methods mainly aim at detecting attacks in social network by a series of abnormal states of accounts, the content of messages, or the social relationship of users. There are little related works in the early stages of attacks in social network [20,[23][24][25], and our approach is primarily aimed at the reconnaissance stage of the attack. At this stage, the attacker collects and analyzes users' information and selects the appropriate attack target and method.…”
Section: Related Workmentioning
confidence: 99%
“…Khattab et al (2006) and Moore (2016) examine how honeypot principles could be utilized to detect and mitigate attacks, such as spoofing, 2 DDOS, and ransomware attacks. Paradise et al (2017) investigate the application of honeypots to the reconnaissance phase of advanced persistent threats (APTs) as a way to collect basic indications of potential forthcoming attacks. A common theme to these articles is that honeypots can add an additional layer of security for networks and provide security capabilities not possible by other measures.…”
Section: Deception Detection and Mitigationmentioning
confidence: 99%
“…In many cases, the organization may not become aware of the intrusion for a substantial period of time, compounding the impact on the organization. The longer the time lag, the more difficult it will be for cybersecurity specialists to understand how the attack was performed and apply this learning to prevent future attacks (Paradise et al, 2017). If a honeypot had been employed, a more desirable outcome would occur.…”
Section: Solution: a Proactive Cyber Risk Management Techniquementioning
confidence: 99%
“…In order to evaluate the proposed method for profile generation, we used the dataset from a case study that was collected and used in [15]. The dataset contains 20,673 users with details including: first name, last name, age, address, birthdate, education record (educational institutions, years of study, and education types), and employment record (places of employment, years, and positions).…”
Section: A Real CV Database Descriptionmentioning
confidence: 99%