Honeypot-Research-Papers
Threat analysis papers
A collection of research papers on deception detection and cybersecurity threat analysis
30 stars
3 watching
6 forks
last commit: over 7 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automated deception framework to detect and respond to cyber threats | 443 |
| | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 |
| | A simple honeypot system to detect and respond to potential security threats. | 16 |
| | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 85 |
| | A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
| | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
| | A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |
| | A honeypot system that detects and reports malicious network activity | 3 |
| | Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 101 |
| | Detects and analyzes Botnet connections to identify malware patterns and networks | 304 |
| | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| | A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 |
| | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 24 |
| | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |