Jan. 3, 2023, 2:10 a.m. | Daniel Zielinski, Hisham A. Kholidy

cs.CR updates on arXiv.org arxiv.org

This paper explores deploying a cyber honeypot system to learn how cyber
defenders can use a honeypot system as a deception mechanism to gather
intelligence. Defenders can gather intelligence about an attacker such as the
autonomous system that the IP of the attacker is allocated from, the way the
attacker is trying to penetrate the system, what different types of attacks are
being used, the commands the attacker is running once they are inside the
honeypot, and what malware the …

analysis autonomous cyber cyber deception deception defenders honeypot honeypots impact intelligence learn system tactic

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US