G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan
{"title":"基于一组透明蜜罐的网络空间恶意软件识别","authors":"G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan","doi":"10.1109/ICIPTM57143.2023.10117660","DOIUrl":null,"url":null,"abstract":"The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malware Identification using a set of Transparent Honeypot in Cyberspace\",\"authors\":\"G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan\",\"doi\":\"10.1109/ICIPTM57143.2023.10117660\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.\",\"PeriodicalId\":178817,\"journal\":{\"name\":\"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIPTM57143.2023.10117660\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIPTM57143.2023.10117660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malware Identification using a set of Transparent Honeypot in Cyberspace
The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.