Searched for: subject%3A%22honeypot%22
(1 - 9 of 9)
document
Mladenov, Martin (author)
Supervisory Control and Data Acquisition (SCADA) systems are sometimes exposed on the public Internet. It is possible to quickly and efficiently identify such exposed services. They are commonly part of critical infrastructure, so they need to be protected against cyber attacks. In the past, researchers have scanned the Internet to detect such...
bachelor thesis 2023
document
Bardi, Sara (author), Conti, M. (author), Pajola, L. (author), Tricomi, Pier Paolo (author)
Social Honeypots are tools deployed in Online Social Networks (OSN) to attract malevolent activities performed by spammers and bots. To this end, their content is designed to be of maximum interest to malicious users. However, by choosing an appropriate content topic, this attractive mechanism could be extended to any OSN users, rather than...
conference paper 2023
document
Nguyen, Thanh-Dat (author)
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be audited and monitored by any party. This allows to detect mis­issued certificates quickly and catch the misbehaving certificate authorities. CT makes the certificate ecosystem more transparent and less reliant on trust that trusted certificate...
master thesis 2022
document
de Jonge, Bart (author)
With the amount of network connected devices every increasing, and many of them running the Secure Shell (SSH) protocol to facilitate remote management, research into SSH attacks is more important than ever. SSH honeypots can be used to act like vulnerable systems while gathering valuable data on the attacker and its methods in the meantime. The...
master thesis 2022
document
Tanabe, Rui (author), Watanabe, Tsuyufumi (author), Fujita, Akira (author), Isawa, Ryoichi (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Yoshioka, Katsunari (author), Matsumoto, Tsutomu (author)
Large botnets made up of Internet-of-Things (IoT) devices have a steady presence in the threat landscape since 2016. However, it has not explained how attackers maintain control over their botnets. In this paper, we present a long-term analysis of the infrastructure of IoT botnets based on 36 months of data gathered via honeypots and the...
journal article 2022
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Kamoen, Sille (author)
The number of Internet of Things devices, small low-powered devices with internet connectivity, is undergoing strong growth. As connected devices become the standard, more types of devices are connected to home networks and made accessible from the Internet for convenience. As IoT devices are widely deployed in mass numbers, they can be easily...
master thesis 2018
document
Janssen, Martijn (author), van Nes, Nordin (author), Oomens, Thomas (author)
This report describes the process, motivation and design choices made during the Bachelor End Project in collaboration with DutchSec. The project consists of implementing Lua-scripting into Honeytrap, which is programmed in Go. The following chapters will discuss which design choices were made, how the research was performed and how the final...
bachelor thesis 2018
document
Wang, Meng (author)
Internet of Things (IoT) devices are gaining popularity in daily life as well as in specific fields such as home automation, medical facilities, among others. Many applications can be developed in each domain and new ones appear everyday, requiring a flexible, simple and secure interconnection among "things" [38]. Moreover, IoT platforms could...
master thesis 2017
Searched for: subject%3A%22honeypot%22
(1 - 9 of 9)