Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that a...
Saved in:
| Main Authors: | Carlos Susanto, Moh Ali Romli |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LPPM STIKI Malang
2025-06-01
|
| Series: | J-Intech (Journal of Information and Technology) |
| Subjects: | |
| Online Access: | https://jurnal.stiki.ac.id/J-INTECH/article/view/1924 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots
by: Matej Rabzelj, et al.
Published: (2025-06-01) -
Advancing Cybersecurity with Honeypots and Deception Strategies
by: Zlatan Morić, et al.
Published: (2025-01-01) -
Deep Learning Based Early Intrusion Detection in IIoT using Honeypot
by: Abbasgholi Pashaei, et al.
Published: (2023-06-01) -
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
by: Lihua SONG, et al.
Published: (2022-11-01) -
Honeypot contract detection of blockchain based on deep learning
by: Hongxia ZHANG, et al.
Published: (2022-01-01)