Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = cowrie

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
38 pages, 2036 KiB  
Article
Advancing Cybersecurity with Honeypots and Deception Strategies
by Zlatan Morić, Vedran Dakić and Damir Regvart
Informatics 2025, 12(1), 14; https://doi.org/10.3390/informatics12010014 - 31 Jan 2025
Cited by 2 | Viewed by 8474
Abstract
Cybersecurity threats are becoming more intricate, requiring preemptive actions to safeguard digital assets. This paper examines the function of honeypots as critical instruments for threat detection, analysis, and mitigation. A novel methodology for comparative analysis of honeypots is presented, offering a systematic framework [...] Read more.
Cybersecurity threats are becoming more intricate, requiring preemptive actions to safeguard digital assets. This paper examines the function of honeypots as critical instruments for threat detection, analysis, and mitigation. A novel methodology for comparative analysis of honeypots is presented, offering a systematic framework to assess their efficacy. Seven honeypot solutions, namely Dionaea, Cowrie, Honeyd, Kippo, Amun, Glastopf, and Thug, are analyzed, encompassing various categories, including SSH and HTTP honeypots. The solutions are assessed via simulated network attacks and comparative analyses based on established criteria, including detection range, reliability, scalability, and data integrity. Dionaea and Cowrie exhibited remarkable versatility and precision, whereas Honeyd revealed scalability benefits despite encountering data quality issues. The research emphasizes the smooth incorporation of honeypots with current security protocols, including firewalls and incident response strategies, while offering comprehensive insights into attackers’ tactics, techniques, and procedures (TTPs). Emerging trends are examined, such as incorporating machine learning for adaptive detection and creating cloud-based honeypots. Recommendations for optimizing honeypot deployment include strategic placement, comprehensive monitoring, and ongoing updates. This research provides a detailed framework for selecting and implementing honeypots customized to organizational requirements. Full article
Show Figures

Figure 1

16 pages, 105890 KiB  
Article
Interiority, Metamorphosis, and Simone Leigh’s Hybrid Cowries
by Tiffany Johnson Bidler
Arts 2024, 13(2), 56; https://doi.org/10.3390/arts13020056 - 14 Mar 2024
Viewed by 2653
Abstract
By way of an analysis of Simone Leigh’s You Don’t Know Where Her Mouth Has Been (2017), this essay argues that by hybridizing the cowrie and watermelon, Leigh creates her own natural history of these biological forms that disorders the rigid taxonomic classification [...] Read more.
By way of an analysis of Simone Leigh’s You Don’t Know Where Her Mouth Has Been (2017), this essay argues that by hybridizing the cowrie and watermelon, Leigh creates her own natural history of these biological forms that disorders the rigid taxonomic classification on which systems of discrimination rely. The resulting hybrid cowrie not only defies classification, it also forms a folded architecture that facilitates a Deleuzian reading. The hybrid cowries, by way of their capacious construction and narrow slits, evoke an interiority that enables metamorphosis. By way of the analysis of the works of Cupboard (2014) and Cowrie (Pannier) (2015), the essay further investigates architectural forms. It considers the intricate interactions between the hybrid architecture of natural forms, such as cowries and watermelons, and human-fabricated forms, such as teleuks and crinolines. Full article
Show Figures

Figure 1

23 pages, 551 KiB  
Article
A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
by Sereysethy Touch and Jean-Noël Colin
Appl. Sci. 2022, 12(10), 5224; https://doi.org/10.3390/app12105224 - 21 May 2022
Cited by 16 | Viewed by 4387
Abstract
To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone to attacks—is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real systems. Its usefulness lies in being able to [...] Read more.
To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone to attacks—is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real systems. Its usefulness lies in being able to operate without being identified as a trap by adversaries; otherwise, its values are significantly reduced. A honeypot is commonly classified by the degree of interactions that they provide to the attacker: low, medium and high-interaction honeypots. However, these systems have some shortcomings of their own. First, the low and medium-interaction honeypots can be easily detected due to their limited and simulated functions of a system. Second, the usage of real systems in high-interaction honeypots has a high risk of security being compromised due to its unlimited functions. To address these problems, we developed Asgard an adaptive self-guarded honeypot, which leverages reinforcement learning to learn and record attacker’s tools and behaviour while protecting itself from being deeply compromised. In this paper, we compare Asgard and its variant Midgard with two conventional SSH honeypots: Cowrie and a real Linux system. The goal of the paper is (1) to demonstrate the effectiveness of the adaptive honeypot that can learn to compromise between collecting attack data and keeping the honeypot safe, and (2) the benefit of coupling of the environment state and the action in reinforcement learning to define the reward function to effectively learn its objectives. The experimental results show that Asgard could collect higher-quality attacker data compared to Cowrie while evading the detection and could also protect the system for as long as it can through blocking or substituting the malicious programs and some other commands, which is the major problem of the high-interaction honeypot. Full article
(This article belongs to the Special Issue Recent Advances in Cybersecurity and Computer Networks)
Show Figures

Figure 1

Back to TopTop