2022
DOI: 10.1007/978-3-031-06365-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight On-Demand Honeypot Deployment for Cyber Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…To perform fingerprinting, NMAP sends out a series of probes, analyzes the responses received, and compares them against a database of known OS characteristics. By carefully analyzing network traffic, NMAP is widely used for attempting to determine the OS running on the target device [14]. However, it is worth noting that the accuracy of NMAP's OS identification in real-world networks and on the Internet remains a topic of debate, and there is limited research available on this subject to serve as a reference [15].…”
Section: Introductionmentioning
confidence: 99%
“…To perform fingerprinting, NMAP sends out a series of probes, analyzes the responses received, and compares them against a database of known OS characteristics. By carefully analyzing network traffic, NMAP is widely used for attempting to determine the OS running on the target device [14]. However, it is worth noting that the accuracy of NMAP's OS identification in real-world networks and on the Internet remains a topic of debate, and there is limited research available on this subject to serve as a reference [15].…”
Section: Introductionmentioning
confidence: 99%
“…Considering the computation load and time complexities, Acosta et al [ 16 ] developed lightweight reactive honeypot principles for improving the security features of cyber deception models. In general, cyber deception is the strategy used for tricking the attackers into fake resources (honeypot).…”
Section: Introductionmentioning
confidence: 99%