Honeypot-Research-Papers
Threat analysis papers
A collection of research papers on deception detection and cybersecurity threat analysis
28 stars
3 watching
6 forks
last commit: over 6 years ago Related projects:
Repository | Description | Stars |
---|---|---|
owasp/python-honeypot | Automated deception framework to detect and respond to cyber threats | 434 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
referefref/honeydet | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 84 |
0xballpoint/trapster-community | A multi-service honeypot solution for real-time threat detection and network security monitoring | 25 |
chh/stack-honeypot | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
referefref/modpot | A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
sbousseaden/slides | Collection of resources and concepts for threat hunting and detection engineering. | 372 |
ginger51011/pandoras_pot | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 96 |
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 22 |
fnzv/yafh | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |