DOI QR코드

DOI QR Code

Comparison of Honeypot System, Types, and Tools

  • Received : 2023.11.05
  • Published : 2023.11.30

Abstract

Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

Keywords

References

  1. S. Puri and M. Agnihotri, "A proactive approach for cyber attack mitigation in cloud network," in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017: IEEE, pp. 171-176.
  2. S. Panda, "GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire Attacks," in Cyber Security: Springer, 2018, pp. 81-89.
  3. G. Soni and R. Sudhakar, "A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT," in 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), 2020: IEEE, pp. 377-383.
  4. S. W. Duxbury and D. L. J. C. Haynie, "Criminal network security: An agent-based approach to evaluating network resilience," vol. 57, no. 2, pp. 314-342, 2019. https://doi.org/10.1111/1745-9125.12203
  5. Y. Duan, Y. Cai, Z. Wang, and X. J. A. S. Deng, "A novel network security risk assessment approach by combining subjective and objective weights under uncertainty," vol. 8, no. 3, p. 428, 2018. https://doi.org/10.3390/app8030428
  6. S. Chapman, R. Smith, L. Maglaras, H. J. J. o. S. Janicke, and A. Networks, "Can a network attack be simulated in an emulated environment for network security training?," vol. 6, no. 3, p. 16, 2017. https://doi.org/10.3390/jsan6030016
  7. N. Saxena, S. Grijalva, V. Chukwuka, and A. V. J. I. W. C. Vasilakos, "Network security and privacy challenges in smart vehicle-to-grid," vol. 24, no. 4, pp. 88-98, 2017. https://doi.org/10.1109/MWC.2016.1600039WC
  8. L. Abualigah, M. Abd Elaziz, P. Sumari, Z. W. Geem, and A. H. Gandomi, "Reptile Search Algorithm (RSA): A nature-inspired metaheuristic optimizer," Expert Systems with Applications, vol. 191, p. 116158, 2022.
  9. F. Adriani and D. Ladley, "Social distance, speed of containment and crowding in/out in a network model of contagion," Journal of Economic Behavior & Organization, vol. 190, pp. 597-625, 2021. https://doi.org/10.1016/j.jebo.2021.08.003
  10. A. Fedele and C. Roner, "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, vol. 36, no. 1, pp. 157-187, 2022. https://doi.org/10.1111/joes.12456
  11. S. Kar, S. Sethi, M. K. J. I. J. o. C. N. Bhuyan, and D. Systems, "Security challenges in cognitive radio network and defending against Byzantine attack: A survey," vol. 17, no. 2, pp. 120-146, 2016. https://doi.org/10.1504/IJCNDS.2016.079098
  12. S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. J. I. s. Park, "Social network security: Issues, challenges, threats, and solutions," vol. 421, pp. 43-69, 2017. https://doi.org/10.1016/j.ins.2017.08.063
  13. D. Acemoglu, A. Malekian, and A. J. J. o. E. T. Ozdaglar, "Network security and contagion," vol. 166, pp. 536-585, 2016. https://doi.org/10.1016/j.jet.2016.09.009