Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Honeypot Game Theory against DoS Attack in UAV Cyber

    Shangting Miao1, Yang Li2,*, Quan Pan2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2745-2762, 2023, DOI:10.32604/cmc.2023.037257

    Abstract A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack… More >

  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats

    R. T. Pavendan1,*, K. Sankar1, K. A. Varun Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3331-3348, 2023, DOI:10.32604/iasc.2023.028029

    Abstract Attacks on the cyber space is getting exponential in recent times. Illegal penetrations and breaches are real threats to the individuals and organizations. Conventional security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats (APTs) they fails. These APTs are targeted, more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing defenses. Hence, there is a need for an effective defense system that can achieve a complete reliance of security. To address the above-mentioned issues, this paper proposes a novel honeypot system that tracks the anonymous behavior… More >

  • Open Access

    ARTICLE

    Automatic Botnet Attack Identification Based on Machine Learning

    Peng Hui Li1, Jie Xu1,*, Zhong Yi Xu1, Su Chen1, Bo Wei Niu2, Jie Yin1, Xiao Feng Sun1, Hao Liang Lan1, Lu Lu Chen3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3847-3860, 2022, DOI:10.32604/cmc.2022.029969

    Abstract At present, the severe network security situation has put forward high requirements for network security defense technology. In order to automate botnet threat warning, this paper researches the types and characteristics of Botnet. Botnet has special characteristics in attributes such as packets, attack time interval, and packet size. In this paper, the attack data is annotated by means of string recognition and expert screening. The attack features are extracted from the labeled attack data, and then use K-means for cluster analysis. The clustering results show that the same attack data has its unique characteristics, and the automatic identification of network… More >

  • Open Access

    ARTICLE

    An Adversarial Smart Contract Honeypot in Ethereum

    Yu Han1, Tiantian Ji1, Zhongru Wang1,2,*, Hao Liu3,*, Hai Jiang4, Wendi Wang1, Xiang Cui5

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 247-267, 2021, DOI:10.32604/cmes.2021.015809

    Abstract A smart contract honeypot is a special type of smart contract. This type of contract seems to have obvious vulnerabilities in contract design. If a user transfers a certain amount of funds to the contract, then the user can withdraw the funds in the contract. However, once users try to take advantage of this seemingly obvious vulnerability, they will fall into a real trap. Consequently, the user’s investment in the contract cannot be retrieved. The honeypot induces other accounts to launch funds, which seriously threatens the security of property on the blockchain. Detection methods for honeypots are available. However, studying… More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition approach based on lightweight fuzz… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290

    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

Displaying 1-10 on page 1 of 7. Per Page