Internet deception to share IoC
- Autores
- Maddalena Kreff, Pablo Germán; Venosa, Paula; Bazán, Patricia Alejandra
- Año de publicación
- 2025
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.
Instituto de Investigación en Informática - Materia
-
Ciencias Informáticas
Cyber Threat Intelligence
Honeypots
Cyber Deception
Security Orchestration Automation and Response
Indicator of Compromise
Open Source - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-nd/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/182613
Ver los metadatos del registro completo
id |
SEDICI_3981342872346e5a08d52d20406c6b0b |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/182613 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Internet deception to share IoCMaddalena Kreff, Pablo GermánVenosa, PaulaBazán, Patricia AlejandraCiencias InformáticasCyber Threat IntelligenceHoneypotsCyber DeceptionSecurity Orchestration Automation and ResponseIndicator of CompromiseOpen SourceThe detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.Instituto de Investigación en Informática2025-06info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf96-100http://sedici.unlp.edu.ar/handle/10915/182613enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-2583-1info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-nd/4.0/Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:49:52Zoai:sedici.unlp.edu.ar:10915/182613Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:49:53.042SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Internet deception to share IoC |
title |
Internet deception to share IoC |
spellingShingle |
Internet deception to share IoC Maddalena Kreff, Pablo Germán Ciencias Informáticas Cyber Threat Intelligence Honeypots Cyber Deception Security Orchestration Automation and Response Indicator of Compromise Open Source |
title_short |
Internet deception to share IoC |
title_full |
Internet deception to share IoC |
title_fullStr |
Internet deception to share IoC |
title_full_unstemmed |
Internet deception to share IoC |
title_sort |
Internet deception to share IoC |
dc.creator.none.fl_str_mv |
Maddalena Kreff, Pablo Germán Venosa, Paula Bazán, Patricia Alejandra |
author |
Maddalena Kreff, Pablo Germán |
author_facet |
Maddalena Kreff, Pablo Germán Venosa, Paula Bazán, Patricia Alejandra |
author_role |
author |
author2 |
Venosa, Paula Bazán, Patricia Alejandra |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas Cyber Threat Intelligence Honeypots Cyber Deception Security Orchestration Automation and Response Indicator of Compromise Open Source |
topic |
Ciencias Informáticas Cyber Threat Intelligence Honeypots Cyber Deception Security Orchestration Automation and Response Indicator of Compromise Open Source |
dc.description.none.fl_txt_mv |
The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations. Instituto de Investigación en Informática |
description |
The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations. |
publishDate |
2025 |
dc.date.none.fl_str_mv |
2025-06 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/182613 |
url |
http://sedici.unlp.edu.ar/handle/10915/182613 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/isbn/978-950-34-2583-1 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-nd/4.0/ Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) |
dc.format.none.fl_str_mv |
application/pdf 96-100 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844616358681116672 |
score |
13.069144 |