ABOUT DECOYS IN INFORMATION SYSTEMS

The authors are developing a honeypot-system of increased scalability, as well as individual false objects of attacks in its structure. The obtained experimental results allow to talk about unprecedented volumes of attacks on devices having external access via Internet.

Bibliographic Details
Main Authors: D. S. Silnov, V. A. Perevozchikov, A. V. Egupov
Format: Article
Language:English
Published: CRI «Electronics» 2017-05-01
Series:Радиопромышленность
Subjects:
ssh
Online Access:https://www.radioprom.org/jour/article/view/230
id doaj-fdb681690ce54333897449b25d3457a9
record_format Article
spelling doaj-fdb681690ce54333897449b25d3457a92021-07-28T13:52:35ZengCRI «Electronics»Радиопромышленность2413-95992541-870X2017-05-0127211912210.21778/2413-9599-2017-2-119-122222ABOUT DECOYS IN INFORMATION SYSTEMSD. S. Silnov0V. A. Perevozchikov1A. V. Egupov2National Research Nuclear University MEPhINational Research Nuclear University MEPhINational Research Nuclear University MEPhIThe authors are developing a honeypot-system of increased scalability, as well as individual false objects of attacks in its structure. The obtained experimental results allow to talk about unprecedented volumes of attacks on devices having external access via Internet.https://www.radioprom.org/jour/article/view/230false objectsattackshoneypottelnetssh
collection DOAJ
language English
format Article
sources DOAJ
author D. S. Silnov
V. A. Perevozchikov
A. V. Egupov
spellingShingle D. S. Silnov
V. A. Perevozchikov
A. V. Egupov
ABOUT DECOYS IN INFORMATION SYSTEMS
Радиопромышленность
false objects
attacks
honeypot
telnet
ssh
author_facet D. S. Silnov
V. A. Perevozchikov
A. V. Egupov
author_sort D. S. Silnov
title ABOUT DECOYS IN INFORMATION SYSTEMS
title_short ABOUT DECOYS IN INFORMATION SYSTEMS
title_full ABOUT DECOYS IN INFORMATION SYSTEMS
title_fullStr ABOUT DECOYS IN INFORMATION SYSTEMS
title_full_unstemmed ABOUT DECOYS IN INFORMATION SYSTEMS
title_sort about decoys in information systems
publisher CRI «Electronics»
series Радиопромышленность
issn 2413-9599
2541-870X
publishDate 2017-05-01
description The authors are developing a honeypot-system of increased scalability, as well as individual false objects of attacks in its structure. The obtained experimental results allow to talk about unprecedented volumes of attacks on devices having external access via Internet.
topic false objects
attacks
honeypot
telnet
ssh
url https://www.radioprom.org/jour/article/view/230
work_keys_str_mv AT dssilnov aboutdecoysininformationsystems
AT vaperevozchikov aboutdecoysininformationsystems
AT avegupov aboutdecoysininformationsystems
_version_ 1721270575825944576