The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
This article describes the problems of the modern network scanning, existing software solutions and areas of its applications. The structure of high-performance network scanner is given. There are outlined the main features of the new network scanner, its usage area and improved characteristics.
This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized....
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
This article is devoted to the effectiveness of security systems using Honeypot technology. There are studied basic structures of security systems, which use Honeypot technology. There is described developing process of a “trap” for VNC/RDP protocols, which main goal is to emulate remote desktops. Assembled “trap” will identify the attacker to collect information about his actions by analyzing malicious...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of attacks, analyzed existing software solutions, its basic working principles and opportunities for further improvement. In addition, there is described author's solution, which can increase the attractiveness of SSH honeypot working under...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.