The SDNFV-based network has leveraged the advantages of software-defined networking (SDN) and network-function virtualization (NFV) to become the most prominent network architecture. However, with the advancement of the SDNFV-based network, more attack types have emerged. This research focuses on one of the methods (use of the honeypot system) of preventing these attacks on the SDNFV-based network. We introduce an SDNFV-based elastic virtual honeypot system (EVHS), which not only resolves problems of other current honeypot systems but also employs a new approach to efficiently manage and control honeypots. It uses a network-intrusion-detection system (NIDS) at the border of the network to detect attacks, leverages the advantages of SDN and ...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of p...
Networking is crucial to any organization which interconnecting systems all around the globe. Howeve...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
Honeypots are designed to investigate malicious behavior. Each type of homogeneous honeypot system h...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Honeypots are closely monitored network decoys serving several purposes: they can distract adversari...
Network attacks have become prominent in the modern-day web activities and the black hat community h...
Honeypots have been largely used to capture and investigate malicious behavior through deliberately ...
Large scale networks face daily thousands of network attacks. No matter the strength of the existing...
Honeypots have been largely employed to help securing computer systems and capture malicious activit...
D.Ing. (Electrical Engineering)Abstract: Basically, Intrusion Detection System (IDS) is introduced i...
Honeypots are an effective tool to gain information about so-phisticated attacks and zero-day exploi...
Distributed Denial of Service (DDoS) attacks is the most common type of cyber-attack. Therefore, an ...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of p...
Networking is crucial to any organization which interconnecting systems all around the globe. Howeve...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
Honeypots are designed to investigate malicious behavior. Each type of homogeneous honeypot system h...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Honeypots are closely monitored network decoys serving several purposes: they can distract adversari...
Network attacks have become prominent in the modern-day web activities and the black hat community h...
Honeypots have been largely used to capture and investigate malicious behavior through deliberately ...
Large scale networks face daily thousands of network attacks. No matter the strength of the existing...
Honeypots have been largely employed to help securing computer systems and capture malicious activit...
D.Ing. (Electrical Engineering)Abstract: Basically, Intrusion Detection System (IDS) is introduced i...
Honeypots are an effective tool to gain information about so-phisticated attacks and zero-day exploi...
Distributed Denial of Service (DDoS) attacks is the most common type of cyber-attack. Therefore, an ...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of p...
Networking is crucial to any organization which interconnecting systems all around the globe. Howeve...