Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots.
Nitin NaikPaul JenkinsRoger CookeLongzhi YangPublished in: FUZZ-IEEE (2018)
Keyphrases
- detecting malicious
- network intrusion
- forensic analysis
- fuzzy sets
- network intrusion detection
- fuzzy logic
- intrusion detection
- fuzzy numbers
- human computer interaction
- fuzzy rules
- membership functions
- network security
- countermeasures
- network traffic
- smart card
- fuzzy clustering
- fuzzy set theory
- traffic analysis
- user interaction
- decision making