Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Honeypots). Showing records 1 – 30 of 33 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Ferreira, Ricardo Sérgio Freitas. Captura, análise e identificação de malware: caso de estudo.

Degree: 2015, RCAAP

Dissertação de Mestrado em Tecnologias da Informação e Comunicação

Atualmente a proliferação de software malicioso (malware) é enorme, tornando o malware num dos maiores problemas… (more)

Subjects/Keywords: Software; Malware; Honeypots

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, R. S. F. (2015). Captura, análise e identificação de malware: caso de estudo. (Thesis). RCAAP. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ferreira, Ricardo Sérgio Freitas. “Captura, análise e identificação de malware: caso de estudo.” 2015. Thesis, RCAAP. Accessed January 18, 2021. http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ferreira, Ricardo Sérgio Freitas. “Captura, análise e identificação de malware: caso de estudo.” 2015. Web. 18 Jan 2021.

Vancouver:

Ferreira RSF. Captura, análise e identificação de malware: caso de estudo. [Internet] [Thesis]. RCAAP; 2015. [cited 2021 Jan 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ferreira RSF. Captura, análise e identificação de malware: caso de estudo. [Thesis]. RCAAP; 2015. Available from: http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

2. Seifert, Christian. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.

Degree: 2010, Victoria University of Wellington

 With the increasing connectivity of and reliance on computers and networks, important aspects of computer systems are under a constant threat. In particular, drive-by-download attacks… (more)

Subjects/Keywords: Intrusion detection; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifert, C. (2010). Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1385

Chicago Manual of Style (16th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Doctoral Dissertation, Victoria University of Wellington. Accessed January 18, 2021. http://hdl.handle.net/10063/1385.

MLA Handbook (7th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Web. 18 Jan 2021.

Vancouver:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2010. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/10063/1385.

Council of Science Editors:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Doctoral Dissertation]. Victoria University of Wellington; 2010. Available from: http://hdl.handle.net/10063/1385

3. Eduardo Gomes de Barros. Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots.

Degree: 2010, Instituto Nacional de Pesquisas Espaciais

O tráfego capturado pelos sensores do Consórcio Brasileiro de Honeypots (CBH) revela a existência de um tráfego que existe na Internet independentemente do tipo de… (more)

Subjects/Keywords: honeypots; consórcio brasileiro de honeypots (CBH); ruído de fundo; predição de eventos; honeypots; brazilian honeypots consortium; ruído de fundo; background radiation; early warning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barros, E. G. d. (2010). Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barros, Eduardo Gomes de. “Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots.” 2010. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed January 18, 2021. http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barros, Eduardo Gomes de. “Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots.” 2010. Web. 18 Jan 2021.

Vancouver:

Barros EGd. Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2010. [cited 2021 Jan 18]. Available from: http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barros EGd. Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2010. Available from: http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

4. Syers, John, III. State of the Art Botnet-Centric Honeynet Design.

Degree: MS, Computer Science, 2010, Texas A&M University

 The problem of malware has escalated at a rate that security professionals and researchers have been unable to deal with. Attackers savage the information technology… (more)

Subjects/Keywords: honeynets honeypots botnets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Syers, John, I. (2010). State of the Art Botnet-Centric Honeynet Design. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-666

Chicago Manual of Style (16th Edition):

Syers, John, III. “State of the Art Botnet-Centric Honeynet Design.” 2010. Masters Thesis, Texas A&M University. Accessed January 18, 2021. http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-666.

MLA Handbook (7th Edition):

Syers, John, III. “State of the Art Botnet-Centric Honeynet Design.” 2010. Web. 18 Jan 2021.

Vancouver:

Syers, John I. State of the Art Botnet-Centric Honeynet Design. [Internet] [Masters thesis]. Texas A&M University; 2010. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-666.

Council of Science Editors:

Syers, John I. State of the Art Botnet-Centric Honeynet Design. [Masters Thesis]. Texas A&M University; 2010. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-666

5. Rajan, Sriram. Intrusion Detection and the Use of Deception Systems.

Degree: 2013

Subjects/Keywords: honeypots; intrusion detection; honeynet; network security; honeypots - legal issues

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajan, S. (2013). Intrusion Detection and the Use of Deception Systems. (Thesis). [No school.] Retrieved from http://hdl.handle.net/2249.1/62483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Chicago Manual of Style (16th Edition):

Rajan, Sriram. “Intrusion Detection and the Use of Deception Systems.” 2013. Thesis, [No school]. Accessed January 18, 2021. http://hdl.handle.net/2249.1/62483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

MLA Handbook (7th Edition):

Rajan, Sriram. “Intrusion Detection and the Use of Deception Systems.” 2013. Web. 18 Jan 2021.

Vancouver:

Rajan S. Intrusion Detection and the Use of Deception Systems. [Internet] [Thesis]. [No school]; 2013. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/2249.1/62483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Council of Science Editors:

Rajan S. Intrusion Detection and the Use of Deception Systems. [Thesis]. [No school]; 2013. Available from: http://hdl.handle.net/2249.1/62483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.


Universidade Federal do Maranhão

6. ANTONIO ALFREDO PIRES OLIVEIRA. SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS.

Degree: 2005, Universidade Federal do Maranhão

As técnicas tradicionais de segurança aplicadas em redes de computadores tentam bloquear ataques (utilizando firewalls) ou detectá- los assim que eles ocorrem (utilizando Sistemas de… (more)

Subjects/Keywords: Segurança de Redes; Honeypots; Network Security; Honeynet; Intelligent Agents; Honeypots; Agentes Inteligentes; Network Traps; Honeynet; BANCO DE DADOS; Armadilhas de Redes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

OLIVEIRA, A. A. P. (2005). SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=265

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

OLIVEIRA, ANTONIO ALFREDO PIRES. “SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS.” 2005. Thesis, Universidade Federal do Maranhão. Accessed January 18, 2021. http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=265.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

OLIVEIRA, ANTONIO ALFREDO PIRES. “SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS.” 2005. Web. 18 Jan 2021.

Vancouver:

OLIVEIRA AAP. SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS. [Internet] [Thesis]. Universidade Federal do Maranhão; 2005. [cited 2021 Jan 18]. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=265.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

OLIVEIRA AAP. SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS. [Thesis]. Universidade Federal do Maranhão; 2005. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=265

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas State University – San Marcos

7. Rajan, Sriram. Intrusion Detection and the Use of Deception Systems.

Degree: MS, Computer Science, 2003, Texas State University – San Marcos

 There has been great amount of work done in the field of network intrusion detection over the past 20-30 years. With networks getting faster and… (more)

Subjects/Keywords: Honeypots; Intrusion detection; Honeynet; Network security; Honeypots - legal issues

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajan, S. (2003). Intrusion Detection and the Use of Deception Systems. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/3902

Chicago Manual of Style (16th Edition):

Rajan, Sriram. “Intrusion Detection and the Use of Deception Systems.” 2003. Masters Thesis, Texas State University – San Marcos. Accessed January 18, 2021. https://digital.library.txstate.edu/handle/10877/3902.

MLA Handbook (7th Edition):

Rajan, Sriram. “Intrusion Detection and the Use of Deception Systems.” 2003. Web. 18 Jan 2021.

Vancouver:

Rajan S. Intrusion Detection and the Use of Deception Systems. [Internet] [Masters thesis]. Texas State University – San Marcos; 2003. [cited 2021 Jan 18]. Available from: https://digital.library.txstate.edu/handle/10877/3902.

Council of Science Editors:

Rajan S. Intrusion Detection and the Use of Deception Systems. [Masters Thesis]. Texas State University – San Marcos; 2003. Available from: https://digital.library.txstate.edu/handle/10877/3902


Mississippi State University

8. McGrew, Robert Wesley. Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling.

Degree: MS, Computer Science, 2005, Mississippi State University

 This thesis explores possibilities for extending the features of honeypot systems to decrease the chance of an attacker discovering that they have compromised a honeypot.… (more)

Subjects/Keywords: Redirection; Profiling; Attack; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McGrew, R. W. (2005). Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10282005-082501/ ;

Chicago Manual of Style (16th Edition):

McGrew, Robert Wesley. “Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling.” 2005. Masters Thesis, Mississippi State University. Accessed January 18, 2021. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10282005-082501/ ;.

MLA Handbook (7th Edition):

McGrew, Robert Wesley. “Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling.” 2005. Web. 18 Jan 2021.

Vancouver:

McGrew RW. Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling. [Internet] [Masters thesis]. Mississippi State University; 2005. [cited 2021 Jan 18]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10282005-082501/ ;.

Council of Science Editors:

McGrew RW. Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling. [Masters Thesis]. Mississippi State University; 2005. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10282005-082501/ ;


Rochester Institute of Technology

9. Tamagna-Darr, Lucas. Evaluating the effectiveness of an intrusion prevention / honeypot hybrid.

Degree: 2009, Rochester Institute of Technology

  An intrusion prevention system is a variation of an intrusion detection system that drops packets that are anomalous based on a chosen criteria. An… (more)

Subjects/Keywords: Honeynets; Honeypots; Intrusion prevention; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tamagna-Darr, L. (2009). Evaluating the effectiveness of an intrusion prevention / honeypot hybrid. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tamagna-Darr, Lucas. “Evaluating the effectiveness of an intrusion prevention / honeypot hybrid.” 2009. Thesis, Rochester Institute of Technology. Accessed January 18, 2021. https://scholarworks.rit.edu/theses/620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tamagna-Darr, Lucas. “Evaluating the effectiveness of an intrusion prevention / honeypot hybrid.” 2009. Web. 18 Jan 2021.

Vancouver:

Tamagna-Darr L. Evaluating the effectiveness of an intrusion prevention / honeypot hybrid. [Internet] [Thesis]. Rochester Institute of Technology; 2009. [cited 2021 Jan 18]. Available from: https://scholarworks.rit.edu/theses/620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tamagna-Darr L. Evaluating the effectiveness of an intrusion prevention / honeypot hybrid. [Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Kedrowitsch, Alexander Lee. Deceptive Environments for Cybersecurity Defense on Low-power Devices.

Degree: MS, Computer Science and Applications, 2017, Virginia Tech

 The ever-evolving nature of botnets have made constant malware collection an absolute necessity for security researchers in order to analyze and investigate the latest, nefarious… (more)

Subjects/Keywords: security; deception; honeypots; containers

…101 xi List of Tables 3.1 Listing several popular open-source honeypots and their… …number of tools, referred to as honeypots, that are intended to deceive an attacker into… …monitor the behavior of attackers and study the tools utilized. However, honeypots have… …referred to as high-interaction honeypots) or easier-to-deploy-and-manage, but limited in… …mediuminteraction honeypots). This decision affects the interaction an attacker may have with the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kedrowitsch, A. L. (2017). Deceptive Environments for Cybersecurity Defense on Low-power Devices. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86164

Chicago Manual of Style (16th Edition):

Kedrowitsch, Alexander Lee. “Deceptive Environments for Cybersecurity Defense on Low-power Devices.” 2017. Masters Thesis, Virginia Tech. Accessed January 18, 2021. http://hdl.handle.net/10919/86164.

MLA Handbook (7th Edition):

Kedrowitsch, Alexander Lee. “Deceptive Environments for Cybersecurity Defense on Low-power Devices.” 2017. Web. 18 Jan 2021.

Vancouver:

Kedrowitsch AL. Deceptive Environments for Cybersecurity Defense on Low-power Devices. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/10919/86164.

Council of Science Editors:

Kedrowitsch AL. Deceptive Environments for Cybersecurity Defense on Low-power Devices. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86164

11. João Paulo de Souza Medeiros. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais.

Degree: 2009, Universidade Federal do Rio Grande do Norte

É proposto um novo método para identificação remota de sistemas operacionais que operam em redes TCP/IP. Este método possui diversas aplicações relacionadas à segurança em… (more)

Subjects/Keywords: Identificação remota de sistemas operacionais; Identificação de pilha TCP/IP; Segurança em redes de computadores; Identificação de honeypots; ENGENHARIA ELETRICA; OS fingerprinting; TCP/IP fingerprinting; Network security; Honeypots indentification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medeiros, J. P. d. S. (2009). Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais. (Thesis). Universidade Federal do Rio Grande do Norte. Retrieved from http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=2814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais.” 2009. Thesis, Universidade Federal do Rio Grande do Norte. Accessed January 18, 2021. http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=2814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais.” 2009. Web. 18 Jan 2021.

Vancouver:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais. [Internet] [Thesis]. Universidade Federal do Rio Grande do Norte; 2009. [cited 2021 Jan 18]. Available from: http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=2814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais. [Thesis]. Universidade Federal do Rio Grande do Norte; 2009. Available from: http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=2814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Rio Grande do Norte

12. Medeiros, João Paulo de Souza. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .

Degree: 2009, Universidade do Rio Grande do Norte

 A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network.… (more)

Subjects/Keywords: Identificação remota de sistemas operacionais; Identificação de pilha TCP/IP; Segurança em redes de computadores; Identificação de honeypots; OS fingerprinting; TCP/IP fingerprinting; Network security; Honeypots indentification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medeiros, J. P. d. S. (2009). Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . (Masters Thesis). Universidade do Rio Grande do Norte. Retrieved from http://repositorio.ufrn.br/handle/123456789/15287

Chicago Manual of Style (16th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .” 2009. Masters Thesis, Universidade do Rio Grande do Norte. Accessed January 18, 2021. http://repositorio.ufrn.br/handle/123456789/15287.

MLA Handbook (7th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .” 2009. Web. 18 Jan 2021.

Vancouver:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . [Internet] [Masters thesis]. Universidade do Rio Grande do Norte; 2009. [cited 2021 Jan 18]. Available from: http://repositorio.ufrn.br/handle/123456789/15287.

Council of Science Editors:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . [Masters Thesis]. Universidade do Rio Grande do Norte; 2009. Available from: http://repositorio.ufrn.br/handle/123456789/15287


Universidade do Rio Grande do Norte

13. Medeiros, João Paulo de Souza. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .

Degree: 2009, Universidade do Rio Grande do Norte

 A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network.… (more)

Subjects/Keywords: Identificação remota de sistemas operacionais; Identificação de pilha TCP/IP; Segurança em redes de computadores; Identificação de honeypots; OS fingerprinting; TCP/IP fingerprinting; Network security; Honeypots indentification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medeiros, J. P. d. S. (2009). Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . (Thesis). Universidade do Rio Grande do Norte. Retrieved from http://repositorio.ufrn.br/handle/123456789/15287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .” 2009. Thesis, Universidade do Rio Grande do Norte. Accessed January 18, 2021. http://repositorio.ufrn.br/handle/123456789/15287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medeiros, João Paulo de Souza. “Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais .” 2009. Web. 18 Jan 2021.

Vancouver:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . [Internet] [Thesis]. Universidade do Rio Grande do Norte; 2009. [cited 2021 Jan 18]. Available from: http://repositorio.ufrn.br/handle/123456789/15287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medeiros JPdS. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais . [Thesis]. Universidade do Rio Grande do Norte; 2009. Available from: http://repositorio.ufrn.br/handle/123456789/15287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Klaus Steding-Jessen. Uso de honeypots para o estudo de spam e phishing.

Degree: 2008, Instituto Nacional de Pesquisas Espaciais

Este trabalho propoe uma infra-estrutura extensível de sensores, baseada em honeypots, para estudar o problema do spam e do phishing, de modo a obter dados… (more)

Subjects/Keywords: honeypots; spam; proxies abertos; phishing; estudo; honeyspot; spam; open proxies; phishing; study

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steding-Jessen, K. (2008). Uso de honeypots para o estudo de spam e phishing. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Steding-Jessen, Klaus. “Uso de honeypots para o estudo de spam e phishing.” 2008. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed January 18, 2021. http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Steding-Jessen, Klaus. “Uso de honeypots para o estudo de spam e phishing.” 2008. Web. 18 Jan 2021.

Vancouver:

Steding-Jessen K. Uso de honeypots para o estudo de spam e phishing. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. [cited 2021 Jan 18]. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Steding-Jessen K. Uso de honeypots para o estudo de spam e phishing. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Dowling, Seamus. A new framework for adaptive and agile honeypots.

Degree: 2020, NUI Galway

 As new technological concepts appear and evolve, cyberattack surfaces and vectors are exploited. Every Internet facing device or service is vulnerable from the untrusted external… (more)

Subjects/Keywords: Reinforcement Learning; Honeypots; Adaptive; Agile; Framework; Engineering and Informatics; Information technology; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dowling, S. (2020). A new framework for adaptive and agile honeypots. (Thesis). NUI Galway. Retrieved from http://hdl.handle.net/10379/15832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dowling, Seamus. “A new framework for adaptive and agile honeypots.” 2020. Thesis, NUI Galway. Accessed January 18, 2021. http://hdl.handle.net/10379/15832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dowling, Seamus. “A new framework for adaptive and agile honeypots.” 2020. Web. 18 Jan 2021.

Vancouver:

Dowling S. A new framework for adaptive and agile honeypots. [Internet] [Thesis]. NUI Galway; 2020. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/10379/15832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dowling S. A new framework for adaptive and agile honeypots. [Thesis]. NUI Galway; 2020. Available from: http://hdl.handle.net/10379/15832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Cristine Hoepers. Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets.

Degree: 2008, Instituto Nacional de Pesquisas Espaciais

Para caracterizar e monitorar atividades maliciosas na Internet, um dos métodos utilizados tem sido a colocação de sensores em espaços de endereçamento não utilizados. Dentre… (more)

Subjects/Keywords: formato para troca de dados; XML; correlação de dados; data exchange format; data correlation; honeypots; honeynets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hoepers, C. (2008). Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/[email protected]/2008/08.21.12.34

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hoepers, Cristine. “Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets.” 2008. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed January 18, 2021. http://urlib.net/sid.inpe.br/[email protected]/2008/08.21.12.34.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hoepers, Cristine. “Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets.” 2008. Web. 18 Jan 2021.

Vancouver:

Hoepers C. Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. [cited 2021 Jan 18]. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.21.12.34.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hoepers C. Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.21.12.34

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

17. Yuill, James Joseph. Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.

Degree: PhD, Computer Science, 2007, North Carolina State University

Subjects/Keywords: scanning; intrusion detection; computer security; honeypots; deception

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuill, J. J. (2007). Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5648

Chicago Manual of Style (16th Edition):

Yuill, James Joseph. “Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.” 2007. Doctoral Dissertation, North Carolina State University. Accessed January 18, 2021. http://www.lib.ncsu.edu/resolver/1840.16/5648.

MLA Handbook (7th Edition):

Yuill, James Joseph. “Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.” 2007. Web. 18 Jan 2021.

Vancouver:

Yuill JJ. Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. [Internet] [Doctoral dissertation]. North Carolina State University; 2007. [cited 2021 Jan 18]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5648.

Council of Science Editors:

Yuill JJ. Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. [Doctoral Dissertation]. North Carolina State University; 2007. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5648


Queensland University of Technology

18. Almotairi, Saleh Ibrahim Bakr. Using honeypots to analyse anomalous Internet activities.

Degree: 2009, Queensland University of Technology

 Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security… (more)

Subjects/Keywords: Internet traffic analysis; low-interaction honeypots; packet inter-arrival times; principal component analysis; square prediction error; residual space

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almotairi, S. I. B. (2009). Using honeypots to analyse anomalous Internet activities. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/31833/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Almotairi, Saleh Ibrahim Bakr. “Using honeypots to analyse anomalous Internet activities.” 2009. Thesis, Queensland University of Technology. Accessed January 18, 2021. https://eprints.qut.edu.au/31833/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Almotairi, Saleh Ibrahim Bakr. “Using honeypots to analyse anomalous Internet activities.” 2009. Web. 18 Jan 2021.

Vancouver:

Almotairi SIB. Using honeypots to analyse anomalous Internet activities. [Internet] [Thesis]. Queensland University of Technology; 2009. [cited 2021 Jan 18]. Available from: https://eprints.qut.edu.au/31833/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Almotairi SIB. Using honeypots to analyse anomalous Internet activities. [Thesis]. Queensland University of Technology; 2009. Available from: https://eprints.qut.edu.au/31833/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université du Luxembourg

19. Wagener, Gerard. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour.

Degree: 2011, Université du Luxembourg

 Information security communities are always talking about "attackers" or "blackhats", but in reality very little is known about their skills. The idea of studying attacker… (more)

Subjects/Keywords: information security; reinforcement learning; honeypots; attacker behavior; game theory; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wagener, G. (2011). Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/15673

Chicago Manual of Style (16th Edition):

Wagener, Gerard. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour.” 2011. Doctoral Dissertation, Université du Luxembourg. Accessed January 18, 2021. http://orbilu.uni.lu/handle/10993/15673.

MLA Handbook (7th Edition):

Wagener, Gerard. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour.” 2011. Web. 18 Jan 2021.

Vancouver:

Wagener G. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2011. [cited 2021 Jan 18]. Available from: http://orbilu.uni.lu/handle/10993/15673.

Council of Science Editors:

Wagener G. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour. [Doctoral Dissertation]. Université du Luxembourg; 2011. Available from: http://orbilu.uni.lu/handle/10993/15673

20. Kulle, Linus. Intrusion Attack & Anomaly Detection in IoT Using Honeypots.

Degree: Faculty of Technology and Society (TS), 2020, Malmö University

  This thesis is presented as an artifact of a project conducted at Malmö University IoTaP LABS. The Internet of Things (IoT) is a growing… (more)

Subjects/Keywords: honeypot; honeypots; iot; cyber; cybersecurity; information security; infosec; cybersec; anomaly detection; intrusion detection; iot security; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kulle, L. (2020). Intrusion Attack & Anomaly Detection in IoT Using Honeypots. (Thesis). Malmö University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kulle, Linus. “Intrusion Attack & Anomaly Detection in IoT Using Honeypots.” 2020. Thesis, Malmö University. Accessed January 18, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kulle, Linus. “Intrusion Attack & Anomaly Detection in IoT Using Honeypots.” 2020. Web. 18 Jan 2021.

Vancouver:

Kulle L. Intrusion Attack & Anomaly Detection in IoT Using Honeypots. [Internet] [Thesis]. Malmö University; 2020. [cited 2021 Jan 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kulle L. Intrusion Attack & Anomaly Detection in IoT Using Honeypots. [Thesis]. Malmö University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Wagener, Gérard. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques.

Degree: Docteur es, Informatique, 2011, Vandoeuvre-les-Nancy, INPL; Université du Luxembourg

Les communautés de la sécurité informatique parlent de "pirates informatiques", mais en réalité, très peu est connu au sujet de leurs compétences. Durant la dernière… (more)

Subjects/Keywords: Sécurité des informations; Pot de miel; Comportement des pirates informatiques; Théorie des jeux; Apprentissae par renforcement; Information security; Honeypots; Attacker behaviour; Game theory; Reinforcement learning; 006

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wagener, G. (2011). Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. (Doctoral Dissertation). Vandoeuvre-les-Nancy, INPL; Université du Luxembourg. Retrieved from http://www.theses.fr/2011INPL037N

Chicago Manual of Style (16th Edition):

Wagener, Gérard. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques.” 2011. Doctoral Dissertation, Vandoeuvre-les-Nancy, INPL; Université du Luxembourg. Accessed January 18, 2021. http://www.theses.fr/2011INPL037N.

MLA Handbook (7th Edition):

Wagener, Gérard. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques.” 2011. Web. 18 Jan 2021.

Vancouver:

Wagener G. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. [Internet] [Doctoral dissertation]. Vandoeuvre-les-Nancy, INPL; Université du Luxembourg; 2011. [cited 2021 Jan 18]. Available from: http://www.theses.fr/2011INPL037N.

Council of Science Editors:

Wagener G. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour : Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. [Doctoral Dissertation]. Vandoeuvre-les-Nancy, INPL; Université du Luxembourg; 2011. Available from: http://www.theses.fr/2011INPL037N

22. Chairetakis, Eleftherios; Alkudhir, Bassam. Deployment of Low Interaction Honeypots in University Campus Network.

Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University

  Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as… (more)

Subjects/Keywords: low interaction honeypots; deception; university campus network; network attacks

…5 2.1. Honeypots & Network Security… …5 2.1.2. History of Honeypots… …7 2.1.3.1. Research honeypots… …7 2.1.3.2. Production honeypots… …7 2.1.3.3. Low Interaction Honeypots… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chairetakis, Eleftherios; Alkudhir, B. (2013). Deployment of Low Interaction Honeypots in University Campus Network. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chairetakis, Eleftherios; Alkudhir, Bassam. “Deployment of Low Interaction Honeypots in University Campus Network.” 2013. Thesis, Halmstad University. Accessed January 18, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chairetakis, Eleftherios; Alkudhir, Bassam. “Deployment of Low Interaction Honeypots in University Campus Network.” 2013. Web. 18 Jan 2021.

Vancouver:

Chairetakis, Eleftherios; Alkudhir B. Deployment of Low Interaction Honeypots in University Campus Network. [Internet] [Thesis]. Halmstad University; 2013. [cited 2021 Jan 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chairetakis, Eleftherios; Alkudhir B. Deployment of Low Interaction Honeypots in University Campus Network. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

23. Akkaya, Deniz. Honeypots in network security.

Degree: Physics and Mathematics, 2010, Linnaeus University

  Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking… (more)

Subjects/Keywords: Honeypot; hacking; security; forensic analysis of honeypots; network; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akkaya, D. (2010). Honeypots in network security. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akkaya, Deniz. “Honeypots in network security.” 2010. Thesis, Linnaeus University. Accessed January 18, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akkaya, Deniz. “Honeypots in network security.” 2010. Web. 18 Jan 2021.

Vancouver:

Akkaya D. Honeypots in network security. [Internet] [Thesis]. Linnaeus University; 2010. [cited 2021 Jan 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akkaya D. Honeypots in network security. [Thesis]. Linnaeus University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

24. Prathapani, Anoosha. Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks.

Degree: MS, Engineering and Applied Science: Electrical Engineering, 2010, University of Cincinnati

  A Wireless Mesh Network (WMN) is a promising means to provide low-cost broadband Internet access. The routing protocols naively assume all nodes in the… (more)

Subjects/Keywords: Electrical Engineering; AODV; BLACKHOLE; HONEYPOTS; MALICIOUS; SPOOFED; WIRELESS MESH NETWORKS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Prathapani, A. (2010). Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348

Chicago Manual of Style (16th Edition):

Prathapani, Anoosha. “Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks.” 2010. Masters Thesis, University of Cincinnati. Accessed January 18, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

MLA Handbook (7th Edition):

Prathapani, Anoosha. “Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks.” 2010. Web. 18 Jan 2021.

Vancouver:

Prathapani A. Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks. [Internet] [Masters thesis]. University of Cincinnati; 2010. [cited 2021 Jan 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

Council of Science Editors:

Prathapani A. Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks. [Masters Thesis]. University of Cincinnati; 2010. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348

25. Mansoori, Masood. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.

Degree: 2017, Victoria University of Wellington

 Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit… (more)

Subjects/Keywords: Geolocation Attacks; HAZOP; Client Honeypots; Browser Based Attacks; IP Tracking; Browser Exploit Kits; YALIH; Localized Attacks; Targeted attacks; Honeypots; Honey clients; Hazard and Operability

…68 3.8.1 Low Interaction Client Honeypots . . . . . . . . . . . 69 3.8.2 High… …Interaction Client Honeypots . . . . . . . . . . . 73 Static Analysis of Dynamic Content… …positive rate of several client honeypots and detection engines of YALIH on the ”clean dataset… …of attacks. Statistics provided by research organisations running server honeypots have… …detection mechanisms used in the client honeypots. In a low-interaction client honeypot, a false… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mansoori, M. (2017). Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/6567

Chicago Manual of Style (16th Edition):

Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Doctoral Dissertation, Victoria University of Wellington. Accessed January 18, 2021. http://hdl.handle.net/10063/6567.

MLA Handbook (7th Edition):

Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Web. 18 Jan 2021.

Vancouver:

Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2017. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/10063/6567.

Council of Science Editors:

Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Doctoral Dissertation]. Victoria University of Wellington; 2017. Available from: http://hdl.handle.net/10063/6567


Vrije Universiteit Amsterdam

26. Portokalidis, G. Using Virtualisation to Protect Against Zero-Day Attacks .

Degree: 2010, Vrije Universiteit Amsterdam

Subjects/Keywords: Protecting against zero-day attacks using virtualization; Security; virtualisation; honeypots; taint analysis; zero-day exploits; smartphones

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Portokalidis, G. (2010). Using Virtualisation to Protect Against Zero-Day Attacks . (Doctoral Dissertation). Vrije Universiteit Amsterdam. Retrieved from http://hdl.handle.net/1871/15684

Chicago Manual of Style (16th Edition):

Portokalidis, G. “Using Virtualisation to Protect Against Zero-Day Attacks .” 2010. Doctoral Dissertation, Vrije Universiteit Amsterdam. Accessed January 18, 2021. http://hdl.handle.net/1871/15684.

MLA Handbook (7th Edition):

Portokalidis, G. “Using Virtualisation to Protect Against Zero-Day Attacks .” 2010. Web. 18 Jan 2021.

Vancouver:

Portokalidis G. Using Virtualisation to Protect Against Zero-Day Attacks . [Internet] [Doctoral dissertation]. Vrije Universiteit Amsterdam; 2010. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/1871/15684.

Council of Science Editors:

Portokalidis G. Using Virtualisation to Protect Against Zero-Day Attacks . [Doctoral Dissertation]. Vrije Universiteit Amsterdam; 2010. Available from: http://hdl.handle.net/1871/15684

27. Izagirre, Mikel. Deception strategies for web application security: application-layer approaches and a testing platform.

Degree: Electrical and Space Engineering, 2017, Luleå University of Technology

  The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments.… (more)

Subjects/Keywords: deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Izagirre, M. (2017). Deception strategies for web application security: application-layer approaches and a testing platform. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Izagirre, Mikel. “Deception strategies for web application security: application-layer approaches and a testing platform.” 2017. Thesis, Luleå University of Technology. Accessed January 18, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Izagirre, Mikel. “Deception strategies for web application security: application-layer approaches and a testing platform.” 2017. Web. 18 Jan 2021.

Vancouver:

Izagirre M. Deception strategies for web application security: application-layer approaches and a testing platform. [Internet] [Thesis]. Luleå University of Technology; 2017. [cited 2021 Jan 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Izagirre M. Deception strategies for web application security: application-layer approaches and a testing platform. [Thesis]. Luleå University of Technology; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Ben Mustapha, Yosra. Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions.

Degree: Docteur es, Informatique et réseaux, 2015, Evry, Institut national des télécommunications

Les SIEMs (systèmes pour la Sécurité de l’Information et la Gestion des Événements) sont les cœurs des centres opérationnels de la sécurité. Ils corrèlent un… (more)

Subjects/Keywords: Corrélation d'alertes; Aide à la décision; Pots de miels; Renforcement de politique de sécurité; Systèmes de détection d'intrusions; Réponses aux intrusions; Alert correlation; Decision support; Honeypots; Security policy enforcement; Detection systems; Responses to intrusions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ben Mustapha, Y. (2015). Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2015TELE0007

Chicago Manual of Style (16th Edition):

Ben Mustapha, Yosra. “Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions.” 2015. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed January 18, 2021. http://www.theses.fr/2015TELE0007.

MLA Handbook (7th Edition):

Ben Mustapha, Yosra. “Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions.” 2015. Web. 18 Jan 2021.

Vancouver:

Ben Mustapha Y. Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2015. [cited 2021 Jan 18]. Available from: http://www.theses.fr/2015TELE0007.

Council of Science Editors:

Ben Mustapha Y. Alert correlation towards an efficient response decision support : Corrélation d’alertes : un outil plus efficace d’aide à la décision pour répondre aux intrusions. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2015. Available from: http://www.theses.fr/2015TELE0007


University of Florida

29. TANG, YONG ( Author, Primary ). Defending against Internet Worms.

Degree: University of Florida

Subjects/Keywords: Bytes; Customers; False positive errors; Frequency distribution; Honeypots; Infections; Internet; Internet service providers; Payloads; Worms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

TANG, YONG ( Author, P. ). (n.d.). Defending against Internet Worms. (Thesis). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0013742

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

TANG, YONG ( Author, Primary ). “Defending against Internet Worms.” Thesis, University of Florida. Accessed January 18, 2021. https://ufdc.ufl.edu/UFE0013742.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

TANG, YONG ( Author, Primary ). “Defending against Internet Worms.” Web. 18 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

TANG, YONG ( Author P). Defending against Internet Worms. [Internet] [Thesis]. University of Florida; [cited 2021 Jan 18]. Available from: https://ufdc.ufl.edu/UFE0013742.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

TANG, YONG ( Author P). Defending against Internet Worms. [Thesis]. University of Florida; Available from: https://ufdc.ufl.edu/UFE0013742

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

30. Litchfield, Samuel Lewis. HoneyPhy: A physics-aware CPS honeypot framework.

Degree: MS, Electrical and Computer Engineering, 2017, Georgia Tech

 Cyber Physical Systems (CPS) are vulnerable systems, and attacks are currently being carried out against them. Some of these attacks have never been seen before,… (more)

Subjects/Keywords: Cyber-physical systems; CPS; Honeypots; Modeling; Process modeling; Device modeling; Containers

…LIST OF TABLES 2.1 Modeling Capabilities of Existing CPS Honeypots… …understand what attackers are doing, and how they are doing it. Traditionally, honeypots have been… …a tool used to gain this information, but honeypots need to be convincing to fool… …many honeypots were linked together to form Honeynets, in order to emulate full deployed… …networks. As attackers learned of honeypots, they improved their techniques to detect whether a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Litchfield, S. L. (2017). HoneyPhy: A physics-aware CPS honeypot framework. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58329

Chicago Manual of Style (16th Edition):

Litchfield, Samuel Lewis. “HoneyPhy: A physics-aware CPS honeypot framework.” 2017. Masters Thesis, Georgia Tech. Accessed January 18, 2021. http://hdl.handle.net/1853/58329.

MLA Handbook (7th Edition):

Litchfield, Samuel Lewis. “HoneyPhy: A physics-aware CPS honeypot framework.” 2017. Web. 18 Jan 2021.

Vancouver:

Litchfield SL. HoneyPhy: A physics-aware CPS honeypot framework. [Internet] [Masters thesis]. Georgia Tech; 2017. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/1853/58329.

Council of Science Editors:

Litchfield SL. HoneyPhy: A physics-aware CPS honeypot framework. [Masters Thesis]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58329

[1] [2]

.