Published May 23, 2022
| Version v1
Conference paper
Open
MOBILE COMMUNICATION SECURITY DEFENSE METHOD BASED ON HONEYPOT TECHNOLOGY
Creators
- 1. PHD, Associate Professor, Head of the Department of "Information Security", Tashkent University of Information Technology named after Muhammad al-Khwarizmi, Uzbekistan
- 2. Master's degree, specialty "Information Security", Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan
- 3. Bachelor degree, Faculty of Radio and Mobile Communications, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan
Description
First, honeypot technology is used to collect unknown threat information on mobile terminals, and then unknown threat intrusion detection rules are set to draw the threat path. Finally, honeypot technology is combined to establish an intelligent defense model for unknown threats on mobile terminals.
Files
Gulomov Sherzod Rajaboyevich.pdf
Files
(719.4 kB)
Name | Size | Download all |
---|---|---|
md5:d1f9051ce931d6478ba4c6420bb03892
|
719.4 kB | Preview Download |