2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) 2017
DOI: 10.1109/eiconrus.2017.7910572
|View full text |Cite
|
Sign up to set email alerts
|

Development and implementation of a Honeypot-trap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…There is also extensive work done on utilizing adversarial transferability in other forms of adversarial attacks, deep learning vulnerabilities in DNNs, and black-box attacks in machine learning. Among other interesting work that served as motivation for this thesis include: utilizing honeypots in defense techniques, such as design and implementation of a honey-trap [12]; deception in decentralized system environments [34]; and using containers in deceptive honeypots [18].…”
Section: Related Workmentioning
confidence: 99%
“…There is also extensive work done on utilizing adversarial transferability in other forms of adversarial attacks, deep learning vulnerabilities in DNNs, and black-box attacks in machine learning. Among other interesting work that served as motivation for this thesis include: utilizing honeypots in defense techniques, such as design and implementation of a honey-trap [12]; deception in decentralized system environments [34]; and using containers in deceptive honeypots [18].…”
Section: Related Workmentioning
confidence: 99%
“…It can counter the attackers to safeguard the security of the information system. Honeypot technology is the most common active defense technology, which designs deliberate system vulnerabilities to guide hackers to attack [84]. It can detect eavesdropping hackers and collects all kinds of hacker attack tools for later defense.…”
mentioning
confidence: 99%