Masood Mansoori

Learn More
IP tracking and cloaking are practices for identifying users which are used legitimately by websites to provide services and content tailored to particular users. However, it is believed that these practices are also used by malicious websites to avoid detection by anti-virus companies crawling the web to find malware. In addition, malicious websites are(More)
Server honeypots are static systems, setup to monitor attacks on research and production networks. Static honeypots are unable to represent the dynamic nature of today's networks where different numbers of hardware devices and hosts running various operating systems are online at a particular time and frequently join and leave a network. A single static(More)
This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot(More)
Graphical password authentication was developed based on the premise that humans are better at recognizing visual data than text-based information. Most recognition-based graphical password algorithms (e.g. Passface) possess adequate usability features but are prone to password guessing and shoulder surfing attacks. The recall-based algorithms on the other(More)
  • 1