KIBERHUJUMLARNI OLDINI OLISH UCHUN HONEYPOT TEXNOLOGIYASINING AFZALLIKLAR
Keywords:
Axborot, Internet, honeypot, DMZ, TCP/IP, simulyatsiyaAbstract
Mazkur maqolada kiber xujumlarni oldini olish uchun honeypot texnologiyasining afzalliklar, tarmoq xavfsizligini ta’minlovchi vositalar, honeypotlarni jismoniy yoki virtual ekanligiga qarab farqlash mumkinligi haqida ma’lumotlar berilgan.
References
P. Owezarski, “Unsupervised classification and characterization of honeypot attacks,” in Proceedings of 10th International Conference on Netw and Service Management (CNSM) and Workshop, pp. 10–18, Rio de Janeiro, Brazil, November 2014. View at: Publisher Site Google Scholar
2.S. Dowling, M. Schukat, and E. Barrett, “Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware,”Journal of Cyber Security Technology, vol. 2, no. 2, pp. 75–91, 2018. View at: Google Scholar
3.I. M. M. Matin and B. Rahardjo, “Malware detection using honeypot and machine learning,” inProceedings of 2019 7th International Conference on Cyber and IT Service Management (CITSM), pp. 1–4, Bandung Institute of Technology, Bandung, Indonesia, November 2019.View at:Google Scholar
4.L. Spitzner,Honeypots: Tracking Hackers, Addison-Wesley, Clemson, SC, USA, 2003