Honeypot-Research-Papers
Threat analysis papers
A collection of research papers on deception detection and cybersecurity threat analysis
30 stars
3 watching
6 forks
last commit: over 6 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Automated deception framework to detect and respond to cyber threats | 443 |
| A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 |
| A simple honeypot system to detect and respond to potential security threats. | 16 |
| A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 85 |
| A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
| A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
| A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |
| A honeypot system that detects and reports malicious network activity | 3 |
| Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 101 |
| Detects and analyzes Botnet connections to identify malware patterns and networks | 304 |
| A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 |
| An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 24 |
| A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |