|
[1] Matrix | MITRE Engage™. Accessed on February 22, 2024. [Online]. Available: https://engage.mitre.org/matrix/ [2] GitHub - cowrie/cowrie: Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io. Accessed on February 22, 2024. [Online]. Available: https://github.com/cowrie/cowrie [3] A. Pauna, I. Bica, F. Pop, and A. Castiglione, “On the rewards of self-adaptive iot honeypots,” Annals of Telecommunications, vol. 74, pp. 501–515, 2019. [4] L. Huang and Q. Zhu, “Adaptive honeypot engagement through reinforcement learning of semi-markov decision processes,” in Decision and Game Theory for Security: 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30–November 1, 2019, Proceedings 10. Springer, 2019, pp. 196–216. [5] S. Suratkar, K. Shah, A. Sood, A. Loya, D. Bisure, U. Patil, and F. Kazi, “An adaptive honeypot using q-learning with severity analyzer,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 10, pp. 4865–4876, 2022. [6] D. Fraunholz, M. Zimmermann, and H. D. Schotten, “An adaptive honeypot configuration, deployment and maintenance strategy,” in 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, 2017, pp. 53–57. [7] A. Pauna, A.-C. Iacob, and I. Bica, “Qrassh-a self-adaptive ssh honeypot driven by q-learning,” in 2018 international conference on communications (COMM). IEEE, 2018, pp. 441–446. [8] S. Touch and J.-N. Colin, “Asguard: Adaptive self-guarded honeypot.” in WEBIST, 2021, pp. 565–574. [9] MITRE ATT&CK. Accessed on February 22, 2024. [Online]. Available: https://attack.mitre.org/ [10] M. M. Chowdhury, J. M. Del Toro, and K. Kambhampaty, “Active cyber defense by benevolent worms,” in 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022, pp. 580–585. [11] Y. Jiang, J. Zhou, Y. Gan, and Z. Cai, “A method of in-depth-defense for network security based on immunity principles,” in 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE, 2009, pp. 484–487. [12] M. Gutierrez and C. Kiekintveld, “Online learning methods for controlling dynamic cyber deception strategies,” Adaptive autonomous secure cyber systems, pp. 231–251, 2020. [13] Z. Zhou, X. Kuang, L. Sun, L. Zhong, and C. Xu, “Endogenous security defense against deductive attack: When artificial intelligence meets active defense for online service,” IEEE Communications Magazine, vol. 58, no. 6, pp. 58–64, 2020. [14] X. Wei and D. Yang, “Study on active defense of honeypot-based industrial control network,” in 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). IEEE, 2021, pp. 2019–2022. [15] Y. Sun, X. Peng, Z. Tian, and S. Guo, “A deception defense and active defense based three-dimensional defense architecture: Da-3dd design and implementation plan,” in 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE, 2019, pp. 422–427. [16] X. Yu, “Research on active defence technology with host intrusion based on k-nearest neighbor algorithm of kernel,” in 2009 Fifth International Conference on Information Assurance and Security, vol. 1. IEEE, 2009, pp. 411–414. [17] GitHub - magisterquis/sshhipot: High-interaction MitM SSH honeypot. Accessed on February 22, 2024. [Online]. Available: https://github.com/magisterquis/sshhipot [18] Kojoney - A honeypot for the SSH Service. Accessed on February 22, 2024. [Online]. Available: https://kojoney.sourceforge.net/ [19] GitHub - desaster/kippo: Kippo - SSH Honeypot. Accessed on February 22, 2024. [Online]. Available: https://github.com/desaster/kippo [20] A. Pauna and I. Bica, “Rassh-reinforced adaptive ssh honeypot,” in 2014 10th International Conference on Communications (COMM). IEEE, 2014, pp. 1–6. [21] W. Cabral, C. Valli, L. Sikos, and S. Wakeling, “Review and analysis of cowrie artefacts and their potential to be used deceptively,” in 2019 International Conference on computational science and computational intelligence (CSCI). IEEE, 2019, pp. 166–171. [22] P. Wang, L. Wu, R. Cunningham, and C. C. Zou, “Honeypot detection in advanced botnet attacks,” International Journal of Information and Computer Security, vol. 4, no. 1, pp. 30–51, 2010. [23] GitHub - redcanaryco/atomic-red-team: Small and highly portable detection tests based on MITRE ATT&CK. Accessed on February 22, 2024. [Online]. Available: https://github.com/redcanaryco/atomic-red-team [24] GitHub - jackaduma/SecBERT: pretrained BERT model for cyber security text, learned CyberSecurity Knowledge. Accessed on February 22, 2024. [Online]. Available: https://github.com/jackaduma/SecBERT [25] H. Van Hasselt, A. Guez, and D. Silver, “Deep reinforcement learning with double q-learning,” in Proceedings of the AAAI conference on artificial intelligence, vol. 30, no. 1, 2016. [26] GitHub - CVEProject/cvelistV5: CVE cache of the official CVE List in CVE JSON 5 format. Accessed on November 01, 2023. [Online]. Available: https://github.com/CVEProject/cvelistV5.git [27] GitHub - adpauna/qrassh. Accessed on February 22, 2024. [Online]. Available: https://github.com/adpauna/qrassh
|