최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.23 no.2, 2023년, pp.37 - 45
유선모 (주식회사 앰진) , 위성모 (한국인터넷진흥원 탐지대응팀) , 한종화 (한국인터넷진흥원 탐지대응팀) , 김용현 (주식회사 앰진) , 조정식 (한국인터넷진흥원 탐지대응팀)
Cyber deception technology plays a crucial role in monitoring attacker activities and detecting new types of attacks. However, along with the advancements in deception technology, the development of Anti-honeypot technology has allowed attackers who recognize the deceptive environment to either ceas...
Stoll, Cliff. 2005. The Cuckoo's Egg: Tracking a?Spy Through the Maze of Computer Espionage.?Simon and Schuster.
Pouget, F., Marc Dacier, and Herve Debar. 2003.?"White Paper: Honeypot, Honeynet, Honeytoken:?Terminological Issues." Rapport Technique EURECOM?1275 (September).
Cenys, Antanas, Darius Rainys, Lukas Radvilavicius,?and Nikolaj Goranin. 2005. "Implementation of?Honeytoken Module In DBMS Oracle 9ir2?Enterprise Edition for Internal Malicious Activity?Detection." January.
"HoneyGen: An Automated Honeytokens Generator."?IEEE Conference Publication, IEEE Xplore. n.d.?Accessed March 24, 2023. https://ieeexplore.ieee.org/abstract/document/5984063.
Taofeek, Olayiwola Tokunbo, Moatsum Alawida,?Abdulatif Alabdulatif, Abiodun Esther Omolara,?and Oludare Isaac Abiodun. 2022. "A Cognitive?Deception Model for Generating Fake Documents?to Curb Data Exfiltration in Networks During?Cyber-Attacks." IEEE Access 10: 41457-76.?https://doi.org/10.1109/ACCESS.2022.3166628.
Karuna, Prakruthi, Hemant Purohit, Sushil Jajodia,?Rajesh Ganesan, and Ozlem Uzuner. 2021. "Fake?Document Generation for Cyber Deception by?Manipulating Text Comprehensibility." IEEE?Systems Journal 15 (1): 835-45. https://doi.org/10.1109/JSYST.2020.2980177.
Redwood, Owen, Joshua Lawrence, and Mike Burmester.?2015. "A Symbolic Honeynet Framework for?SCADA System Threat Intelligence." In Critical?Infrastructure Protection IX, edited by Mason?Rice and Sujeet Shenoi, 103-18. IFIP Advances?in Information and Communication Technology.?Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-26567-4_7.
Banerjee, Mahesh, and Dr S D Samantaray. 2019.?"Network Traffic Analysis Based IoT Botnet?Detection Using Honeynet Data Applying Classification?Techniques." 17 (8).
N. Krawetz, "Anti-honeypot technology," IEEE?Security & Privacy, vol. 2, no. 1, pp. 76-79, Jan.?2004, doi: 10.1109/MSECP.2004.1264861.
Sunmo. Yoo, Sungmo Wi, Jonghwa Han, Yonghyoun?Kim, Jungsik Cho, "Anti-Deception Inference?and Feature Extraction for Predicting Deception?Awareness," in 2023 한국융합보안학회 하계학술대회.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.