Published May 23, 2022 | Version v1
Conference paper Open

MOBILE COMMUNICATION SECURITY DEFENSE METHOD BASED ON HONEYPOT TECHNOLOGY

  • 1. PHD, Associate Professor, Head of the Department of "Information Security", Tashkent University of Information Technology named after Muhammad al-Khwarizmi, Uzbekistan
  • 2. Master's degree, specialty "Information Security", Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan
  • 3. Bachelor degree, Faculty of Radio and Mobile Communications, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan

Description

First, honeypot technology is used to collect unknown threat information on mobile terminals, and then unknown threat intrusion detection rules are set to draw the threat path. Finally, honeypot technology is combined to establish an intelligent defense model for unknown threats on mobile terminals.

Files

Gulomov Sherzod Rajaboyevich.pdf

Files (719.4 kB)

Name Size Download all
md5:d1f9051ce931d6478ba4c6420bb03892
719.4 kB Preview Download