2022
DOI: 10.14704/web/v19i1/web19370
|View full text |Cite
|
Sign up to set email alerts
|

Review of Cyber Attack Detection: Honeypot System

Abstract: The number of connected devices in the network is growing day by day, and as the number of linked devices grows, so will the number of cyberattacks. All devices connected to the Internet has become a target of cyberattacks as network attack methods have developed. As a result, the security of network data cannot be neglected. To handle the future threats in this way, we employ honeypots, which are conceptual framework traps designed to block unauthorized access to both PCs and data. Every day, a large number o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…A honeypot is a proactive, aggressive network spoofing defense technology. It is able to simulate real services to attract attackers to attack and collect attack data, analyze attack behavior, and protect real systems from attacks [24][25][26]. A network environment where multiple honeypots are intricately deployed is known as a honeynet.…”
Section: Honeypot and Honeynetmentioning
confidence: 99%
“…A honeypot is a proactive, aggressive network spoofing defense technology. It is able to simulate real services to attract attackers to attack and collect attack data, analyze attack behavior, and protect real systems from attacks [24][25][26]. A network environment where multiple honeypots are intricately deployed is known as a honeynet.…”
Section: Honeypot and Honeynetmentioning
confidence: 99%
“…While adware can occasionally be safe, some pop-ups also aim to gather data and information through targeted advertisements in addition to displaying advertisements. It can use numerous advertising links to route you to malicious websites and infected pages 3 .…”
Section: Malware Typesmentioning
confidence: 99%
“…The collected malware should be investigated through open sources. The use of trap systems called Honeypot [3] which attract attackers to find malware used in current attacks and make them think that they have gained access to a real system is also preferred by researchers.…”
Section: Introductionmentioning
confidence: 99%
“…The Internet of Things (IoT) enables interconnectedness among devices, fostering data exchange for automation and informed decision-making across various sectors [ 2 , 3 , 4 ]. Security concerns in IoT necessitate safeguarding data and preventing device compromise.…”
Section: Introductionmentioning
confidence: 99%