How to cite this paper
AlZoubi, W & Alrashdan, M. (2022). The effect of using honeypot network on system security.International Journal of Data and Network Science, 6(4), 1413-1418.
Refrences
Artail, H., Safa, H., Sraj, M., Kuwatly, I., & Al-Masri, Z. (2006). A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. computers & security, 25(4), 274-288.
Beham, M., Vlad, M., & Reiser, H. P. (2013, June). Intrusion detection and honeypots in nested virtualization environ-ments. In 2013 43rd Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 1-6). IEEE.
Chawda, K., & Patel, A. D. (2014, February). Dynamic & hybrid honeypot model for scalable network monitoring. In In-ternational conference on information communication and embedded systems (ICICES2014) (pp. 1-5). IEEE.
Chuen, Y. S., Al-rashdan, M. A. E. N., & Al-Maatouk, Q. U. S. A. Y. (2019). Graphical password strategy. Journal of Crit-ical Reviews, 7(3), 2020.
Hadidi, S., Al-Rashdan, M., & Hadidi, M. (2020). Impact web on decision support systems on the organizations. Interna-tional Journal of Science and Technology Resources, 9(4), 1450-1452.
Hair Jr, J. F., Sarstedt, M., Ringle, C. M., & Gudergan, S. P. (2017). Advanced issues in partial least squares structural equa-tion modeling. Sage publications.
Hajivali, M., Moghaddam, F. F., Alrashdan, M. T., & Alothmani, A. Z. (2013, October). Applying an agent-based user au-thentication and access control model for cloud servers. In 2013 International Conference on ICT Convergence (ICTC) (pp. 807-812). IEEE.
Jain, Y. K., & Singh, S. (2011). Honeypot based secure network system. International Journal on Computer Science and Engineering, 3(2), 612-620.
John, J. P., Yu, F., Xie, Y., Krishnamurthy, A., & Abadi, M. (2011, March). Heat-seeking honeypots: design and experi-ence. In Proceedings of the 20th international conference on World wide web (pp. 207-216).
Koniaris, I., Papadimitriou, G., Nicopolitidis, P., & Obaidat, M. (2014, June). Honeypots deployment for the analysis and visualization of malware activity and malicious connections. In 2014 IEEE international conference on communica-tions (ICC) (pp. 1819-1824). IEEE.
Li, S., Zou, Q., & Huang, W. (2014, April). A new type of intrusion prevention system. In 2014 international conference on information science, electronics and electrical engineering (Vol. 1, pp. 361-364). IEEE.
Naik, N., Shang, C., Shen, Q., & Jenkins, P. (2018, June). Intelligent dynamic honeypot enabled by dynamic fuzzy rule in-terpolation. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 1520-1527). IEEE.
Paul, S., & Mishra, B. K. (2013, February). Honeypot based signature generation for defense against polymorphic worm attacks in networks. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 159-163). IEEE.
Pomsathit, A. (2012, May). Effective of unicast and multicast IP address attack over intrusion detection system with honeypot. In 2012 spring congress on engineering and technology (pp. 1-4). IEEE.
Sawehli, A., Al-Rashdan, M. A. E. N., & Al-maatouk, Q. U. S. A. Y. (2019). APU high-speed Internet access: A literature. Journal of Critical Reviews, 7(3), 2020.
Singh, G., Sharma, S., & Singh, P. (2013). Design and develop a Honeypot for small scale organization. International Journal of Innovation Technology Exploration Engineering (IJITEE), 2(3), 170-174.
Spitzner, L. (2002). Hosus (honeypot surveillance system). login: Magazine of Usenix and Sage, 27, 2002-12.
Tavakol, M., & Dennick, R. (2011). Making sense of Cronbach's alpha. International Journal of Medical Education, 2, 53.
Verma, A. (2003). Production honeypots: An organization’s view. SANS Security Essentials, 1, 28.
Beham, M., Vlad, M., & Reiser, H. P. (2013, June). Intrusion detection and honeypots in nested virtualization environ-ments. In 2013 43rd Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 1-6). IEEE.
Chawda, K., & Patel, A. D. (2014, February). Dynamic & hybrid honeypot model for scalable network monitoring. In In-ternational conference on information communication and embedded systems (ICICES2014) (pp. 1-5). IEEE.
Chuen, Y. S., Al-rashdan, M. A. E. N., & Al-Maatouk, Q. U. S. A. Y. (2019). Graphical password strategy. Journal of Crit-ical Reviews, 7(3), 2020.
Hadidi, S., Al-Rashdan, M., & Hadidi, M. (2020). Impact web on decision support systems on the organizations. Interna-tional Journal of Science and Technology Resources, 9(4), 1450-1452.
Hair Jr, J. F., Sarstedt, M., Ringle, C. M., & Gudergan, S. P. (2017). Advanced issues in partial least squares structural equa-tion modeling. Sage publications.
Hajivali, M., Moghaddam, F. F., Alrashdan, M. T., & Alothmani, A. Z. (2013, October). Applying an agent-based user au-thentication and access control model for cloud servers. In 2013 International Conference on ICT Convergence (ICTC) (pp. 807-812). IEEE.
Jain, Y. K., & Singh, S. (2011). Honeypot based secure network system. International Journal on Computer Science and Engineering, 3(2), 612-620.
John, J. P., Yu, F., Xie, Y., Krishnamurthy, A., & Abadi, M. (2011, March). Heat-seeking honeypots: design and experi-ence. In Proceedings of the 20th international conference on World wide web (pp. 207-216).
Koniaris, I., Papadimitriou, G., Nicopolitidis, P., & Obaidat, M. (2014, June). Honeypots deployment for the analysis and visualization of malware activity and malicious connections. In 2014 IEEE international conference on communica-tions (ICC) (pp. 1819-1824). IEEE.
Li, S., Zou, Q., & Huang, W. (2014, April). A new type of intrusion prevention system. In 2014 international conference on information science, electronics and electrical engineering (Vol. 1, pp. 361-364). IEEE.
Naik, N., Shang, C., Shen, Q., & Jenkins, P. (2018, June). Intelligent dynamic honeypot enabled by dynamic fuzzy rule in-terpolation. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 1520-1527). IEEE.
Paul, S., & Mishra, B. K. (2013, February). Honeypot based signature generation for defense against polymorphic worm attacks in networks. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 159-163). IEEE.
Pomsathit, A. (2012, May). Effective of unicast and multicast IP address attack over intrusion detection system with honeypot. In 2012 spring congress on engineering and technology (pp. 1-4). IEEE.
Sawehli, A., Al-Rashdan, M. A. E. N., & Al-maatouk, Q. U. S. A. Y. (2019). APU high-speed Internet access: A literature. Journal of Critical Reviews, 7(3), 2020.
Singh, G., Sharma, S., & Singh, P. (2013). Design and develop a Honeypot for small scale organization. International Journal of Innovation Technology Exploration Engineering (IJITEE), 2(3), 170-174.
Spitzner, L. (2002). Hosus (honeypot surveillance system). login: Magazine of Usenix and Sage, 27, 2002-12.
Tavakol, M., & Dennick, R. (2011). Making sense of Cronbach's alpha. International Journal of Medical Education, 2, 53.
Verma, A. (2003). Production honeypots: An organization’s view. SANS Security Essentials, 1, 28.