參考文獻 |
參考文獻
[1] “Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace”, Accessed on: May 22, 2023. [Online]. https://www.mandiant.com/resources/blog/zero-days-exploited-2022
[2] M. Şenol, “Cyber Security and Defense: Proactive Defense and Deterrence,” 2022 3rd International Informatics and Software Engineering Conference (IISEC), Ankara, Turkey, pp. 1-6, Dec, 2022
[3] R. McGrew, “Experiences with Honeypot Systems: Development, Deployment, and Analysis,” Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS′06), Kauai, HI, USA, pp. 220a-220a, Jan, 2006
[4] “Low, Medium and High Interaction Honeypot Security - Akamai”, Accessed on: May 22, 2023. [Online]. https://www.akamai.com/blog/security/high-interaction-honeypot-versus-low-interaction-honeypot-comparison
[5] W. Sun, C. Yuan and W. Fan, “A Measurement of Real-world Attack Connections toward Honeypots,” 2022 IEEE International Symposium on Measurements & Networking (M&N), Padua, Italy, pp. 1-6, Jul, 2022
[6] M. Shah, S. Ahmed, K. Saeed, M. Junaid, H. Khan and Ata-ur-rehman, “Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool,” 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, pp. 1-6, Jun, 2019
[7] K. Kaushik, I. Punhani, S. Sharma and M. Martolia, “An Advanced Approach for performing Cyber Fraud using Banner Grabbing,” 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, pp. 298-302, Dec, 2022
[8] “Kubernetes”, Accessed on: May 22, 2023. [Online]. https://Kubernetes.io/
[9] “A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018) ”, Accessed on: May 22, 2023. [Online]. https://registry.opendata.aws/cse-cic-ids2018/
[10] D. Watson and J. Riden, “The Honeynet Project: Data Collection Tools, Infrastructure, Archives and Analysis,” 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing, Amsterdam, Netherlands, pp. 24-30, Apr, 2008
[11] D. Fraunholz, D. Krohmer, F. Pohl and H. D. Schotten, “On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework,” 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, pp. 1-4, Feb, 2018
[12] R. Akiyoshi, D. Kotani and Y. Okabe, “Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet,” 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, pp. 658-663, Jul, 2018
[13] Y. -J. Zhang, W. -J. Liu, K. -N. Guo and Y. -M. Kang, “Identification of SSH Honeypots Using Machine Learning Techniques Based on Multi-Fingerprinting,” 2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC), Chongqing, China, pp. 1376-1381, Feb, 2023
[14] M. Knöchel and S. Wefel, “Analysing Attackers and Intrusions on a High-Interaction Honeypot System,” 2022 27th Asia Pacific Conference on Communications (APCC), Jeju Island, Korea, pp. 433-438, Oct, 2022
[15] “Docker”, Accessed on: May 20, 2023. [Online]. https://www.docker.com/
[16] “Podman”, Accessed on: May 20, 2023. [Online]. https://podman.io/
[17] D. Bernstein, “Containers and Cloud: From LXC to Docker to Kubernetes,” in IEEE Cloud Computing, vol. 1, no. 3, pp. 81-84, Sept. 2014
[18] “Summary of the Amazon S3 Service Disruption in the Northern Virginia (US-EAST-1) Region”, Accessed on: May 20, 2023. [Online]. https://aws.amazon.com/tw/message/41926/
[19] “Lightweight Kubernetes”, Accessed on: July 20, 2023. [Online]. https://k3s.io/
[20] I. Haris, L. -L Ferreira, I. Okic, A. Dukkon, Z. Tucakovic and R. Grosu, “QoS for Dynamic Deployment of IoT Services,” 2021 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain, pp. 1144-1151, 2021.
[21] H. Alaidaros, M. Mahmuddin, and A.-M. Ali, “An Overview of Flow-based and Packet-based Intrusion Detection Performance in High Speed Networks,” 2011 The International Arab Conference on Information Technology, Riyadh, Saudi Arabia, pp. 1-9, Dec, 2011
[22] S. Ray, “A Quick Review of Machine Learning Algorithms,” 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Faridabad, India, pp. 35-39, 2019
[23] L. H. Sarker, “Machine Learning: Algorithms, Real-World Applications and Research Directions,” SN Computer Science, 2.3:160 March, 2021
[24] B. Wang, Y. Dou, Y. Sang, Y. Zhang and J. Huang, “IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware,” ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1-7, Jun, 2020
[25] B. Park, S. P. Dang, S. Noh, J. Yi and M. Park, “Dynamic Virtual Network Honeypot,” 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp. 375-377, Oct, 2019
[26] H. Wang and B. Wu, “SDN-Based Hybrid Honeypot for Attack Capture,” 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, pp. 1602-1606, Mar, 2019
[27] J.-C. Acosta, “Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots,” 27th ACM on Symposium on Access Control Models and Technologies, pp. 255-257, Jun, 2022
[28] “CRIU”, Accessed on: May 20, 2023. [Online]. https://criu.org/
[29] X. Chen, J. -H. Jiang and Q. Jiang, “A Method of Self-Adaptive Pre-Copy Container Checkpoint,” 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, pp. 290-300, Nov, 2015,
[30] G. Kokolakis, G. Ntousakis, I. Karatsoris, S. Antonatos, M. Athanatos and S. Ioannidis, “HoneyChart: Automated Honeypot Management over Kubernetes,” Computer Security. ESORICS 2022 International Workshops, pp. 321-328, Sep, 2022
[31] K. Saikawa and V. Klyuev, “Detection and Classification of Malicious Access using a Dionaea Honeypot,” 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, pp. 844-848, Sept, 2019
[32] A. Jicha, M. Patton and H. Chen, “SCADA Honeypots: An in-depth Analysis of Conpot,” 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, pp. 196-198, Sept. 2016
[33] W. Cabral, C. Valli, L. Sikos and S. Wakeling, “Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively,” 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, pp. 166-171, Dec, 2019
[34] Github, “node_exporter”, Accessed on June 5, 2023. [Online]. Available: https://github.com/prometheus/node_exporter
[35] “Prometheus - Monitoring system & time series database”, Accessed on: June 6, 2023. [Online]. https://prometheus.io/
[36] C.-N. Shivayogimath, “An Overview of Network Penetration Testing,” International Journal of Research in Engineering and Technology (IJRET), 2014
[37] K.-L.-L. Kyaw, “Hybrid Honeypot System for Network Security,” International Journal of Computer and Information Engineering, Vol. 12, No. 12, 2008
[38] Github, “cicflowmeter”, Accessed on June 5, 2023. [Online]. Available: https://github.com/datthinh1801/cicflowmeter
[39] D. Berrar, “Cross-Validation.” pp 542-545, 2019
[40] Github, “kubernetes-client/python”, Accessed on June 5, 2023. [Online]. Available: https://github.com/kubernetes-client/python
[41] J. Jiang, J. Lu, G. Zhang and G. Long, “Optimal Cloud Resource Auto-Scaling for Web Applications,” 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, Delft, Netherlands, 2013, pp. 58-65, May, 2013
[42] S. Taherizadeh, V. Stankovski and J. Cho, “Dynamic Multi-level Auto-scaling Rules for Containerized Applications,” in The Computer Journal, vol. 62, no. 2, pp. 174-197, Feb. 2019
[43] R. Moreno-Vozmediano, R.-S. Montero, E. Huedo and I.-M. Llorente, “Efficient Resource Provisioning for Elastic Cloud Services Based on Machine Learning Techniques,” Journal of Cloud Computing, Apr, 2018
[44] P. H. Isolani, N. Cardona, C. Donato, J. Marquez-Barja, L. Z. Granville and S. Latré, “SDN-based Slice Orchestration and MAC Management for QoS delivery in IEEE 802.11 Networks,” 2019 Sixth International Conference on Software Defined Systems (SDS), Rome, Italy, pp. 260-265, 2019
[45] P. Machaka, A. Bagula and F. Nelwamondo, “Using exponentially weighted moving average algorithm to defend against DDoS attacks,” 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), Stellenbosch, South Africa, pp. 1-6, 2016
[46] Github, “Opencanary”, Accessed on June 5, 2023. [Online]. Available: https://github.com/thinkst/opencanary
[47] Github, “patator”, Accessed on June 5, 2023. [Online]. Available: https://github.com/lanjelot/patator
[48] Github, “SecList”, Accessed on June 5, 2023. [Online]. Available: https://github.com/danielmiessler/SecLists
[49] Wikipedia, “Moving average”, Accessed on June 12, 2023. [Online]. Available: https://en.wikipedia.org/wiki/Moving_average
[50] E.-D. Saputro, Y. Purwanto and M.-F. Ruriawan, “Medium Interaction Honeypot Infrastructure on The Internet of Things,” 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), BALI, Indonesia, pp. 98-102, 2020
[51] J.-C. Acosta, “Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities,” MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA, pp. 154-159, 2022
[52] “Forensic container checkpointing in Kubernetes”, Accessed on: June 30, 2023. [Online].Available: https://kubernetes.io/blog/2022/12/05/forensic-container-checkpointing-alpha/
[53] R.-F. Fouladi, O. Ermiş and E. Anarim “A DDoS Attack Detection and Defense Scheme Using Time-series Analysis for SDN,” Journal of Information Security and Applications(JISA), vol 54, 2020
[54] S. Batool, F.-Z. Khan, S.-Q.-A. Shah, M. Ahmed, R. Alroobaea, A.-M. Baqasah, I. Ali and M.-A. Raza, “Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment”, Security and Communication Networks, vol. 2022, Article ID 2593672, 14 pages, 2022 |