Internet deception to share IoC

Autores
Maddalena Kreff, Pablo Germán; Venosa, Paula; Bazán, Patricia Alejandra
Año de publicación
2025
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.
Instituto de Investigación en Informática
Materia
Ciencias Informáticas
Cyber Threat Intelligence
Honeypots
Cyber Deception
Security Orchestration Automation and Response
Indicator of Compromise
Open Source
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-nd/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/182613

id SEDICI_3981342872346e5a08d52d20406c6b0b
oai_identifier_str oai:sedici.unlp.edu.ar:10915/182613
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Internet deception to share IoCMaddalena Kreff, Pablo GermánVenosa, PaulaBazán, Patricia AlejandraCiencias InformáticasCyber Threat IntelligenceHoneypotsCyber DeceptionSecurity Orchestration Automation and ResponseIndicator of CompromiseOpen SourceThe detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.Instituto de Investigación en Informática2025-06info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf96-100http://sedici.unlp.edu.ar/handle/10915/182613enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-2583-1info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-nd/4.0/Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:49:52Zoai:sedici.unlp.edu.ar:10915/182613Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:49:53.042SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Internet deception to share IoC
title Internet deception to share IoC
spellingShingle Internet deception to share IoC
Maddalena Kreff, Pablo Germán
Ciencias Informáticas
Cyber Threat Intelligence
Honeypots
Cyber Deception
Security Orchestration Automation and Response
Indicator of Compromise
Open Source
title_short Internet deception to share IoC
title_full Internet deception to share IoC
title_fullStr Internet deception to share IoC
title_full_unstemmed Internet deception to share IoC
title_sort Internet deception to share IoC
dc.creator.none.fl_str_mv Maddalena Kreff, Pablo Germán
Venosa, Paula
Bazán, Patricia Alejandra
author Maddalena Kreff, Pablo Germán
author_facet Maddalena Kreff, Pablo Germán
Venosa, Paula
Bazán, Patricia Alejandra
author_role author
author2 Venosa, Paula
Bazán, Patricia Alejandra
author2_role author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
Cyber Threat Intelligence
Honeypots
Cyber Deception
Security Orchestration Automation and Response
Indicator of Compromise
Open Source
topic Ciencias Informáticas
Cyber Threat Intelligence
Honeypots
Cyber Deception
Security Orchestration Automation and Response
Indicator of Compromise
Open Source
dc.description.none.fl_txt_mv The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.
Instituto de Investigación en Informática
description The detection of cybersecurity attacks through the collection and analysis of information is a challenge that focuses, in this work, on the use of honeypots, which are decoys that allow attacks to be studied in a controlled environment. The data collected can be used as a source of information in Cyber Threat Intelligence (CTI). Cyber Deception is a form of deception that exploits digital tools to deceive, manipulate or confuse a target, where the value lies in being attacked and investigated. Thus, honeypots constitute a Cyber Deception mechanism. Cybersecurity frameworks provide a reference model for the analysis of attacks, favoring their classification and understanding in order to mitigate them. Furthermore, these frameworks help to understand the stages of attacks linked to Cyber Deception mechanisms, including honeypots. The aim of the work is to analyze the communication mechanisms between honeypots and CTI platforms, with the aim of improving the cybersecurity strategies of organizations.
publishDate 2025
dc.date.none.fl_str_mv 2025-06
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/182613
url http://sedici.unlp.edu.ar/handle/10915/182613
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/isbn/978-950-34-2583-1
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-nd/4.0/
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
dc.format.none.fl_str_mv application/pdf
96-100
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844616358681116672
score 13.069144