Modern Honey Pot Tools on Cloud Virtual Machines for Machine Learning
Abstract
Keywords
Full Text:
PDFReferences
Throsten Holz and Frederic Rayanal, Detecting Honeypots And Other Suspicious Environments, Workshop on the Information Assurance and Security,United States Military Academy,2005.
Zhang Li-juan, Honeypot-based Defense System Research and Design, Computer Science and Information Technology, 2009.
Design of Virtual Honeynet Collaboration System in Existing Security Research Networks _ason Chih-Hung Chang *_, and Yi-Lang Tsai * * CyberSecurity Lab., National Center for High-performance Computing, Hsinchu, Taiwan, R.O.C._ SENSE Lab., Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, R.O.C. E-mail: ch.chang@ieee.org, yilang@nchc.org.tw
Arthur Jicha, Mark Patton, and Hsinchun Chen, SCADA Honeypots, Information and Security Informatics (ISI), 2016.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. Detecting spammers on twitter.Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS, page 12, 2010).
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. Detecting spammers on twitter.Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS, page 12, 2010).
Alex Hai Wang. Don’t follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1–10, July 2010.
Kyumin Lee, James Caverlee, and Steve Webb. Uncovering social spammers: Social honeypots +machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pages 435–442, New York, NY, USA, 2010. ACM
M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC’11, pages 175–186. Springer-Verlag, 2011.
Gianluca Stringhini, Christopher Kruegel, and Giovann Vigna. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pages 1–9, NewYork, NY, USA, 2010. ACM.
Zi Chu, Indra Widjaja, and Haining Wang. Detecting social spam campaigns on twitter. In Applied Cryptography and Network Security, pages 455–472. Springer, 2012.
Juan Martinez-Romo and Lourdes Araujo. Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications, 40(8):2992–3000, 2013.
Mahdi Washha,Aziz Qaroush and Florence Sedes Leveraging Time for Detection on Twitter Spammers,pages-109-117.
DOI: http://dx.doi.org/10.36039/AA042017001.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.