Client honeypot

Results: 68



#Item
11JavaScript / JavaScript engines / Mozilla / SpiderMonkey / Cross-browser / Eval / Client honeypot / Computing / Cross-platform software / Software

Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript Ben Feinstein, CISSP Daniel Peck {bfeinstein, dpeck}@secureworks.com

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:38
12Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:31:23
13Malware / Computer security / Noah / Human geography / Computing / Client honeypot / Computer network security / Honeypot / Security

A design study for a distributed infrastructure to perform zero-day detection of cyberattacks http://www.fp6-noah.org The three-year NoAH project gathers and analyses information about the nature of Internet cyberattack

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 14:04:11
14Software / Computing / Intrusion detection system / Honeyd / Geographic information system / Snort / Client honeypot / Computer network security / Honeypot / Cyberwarfare

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2005-12-14 05:05:52
15Cyberwarfare / Honeypot / Honeyd / Network telescope / Network address translation / Denial-of-service attack / Dynamic Host Configuration Protocol / Client honeypot / Computer network security / Internet / Computing

INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-09-07 19:03:47
16Computing / Honeypot / Client honeypot / Botnet / Exploit / Denial-of-service attack / Vulnerability / Computer insecurity / Malware / Computer network security / Cyberwarfare / Computer security

The Impact of Honeynets for CSIRTs Jan Kohlrausch and Jochen Schönfelder DFN-CERT Services GmbH Heidenkampsweg 41 DHamburg [kohlrausch|schoenfelder]@dfn-cert.de

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 13:18:12
17Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
18Cyberwarfare / CERT Polska / Internet in Poland / Client honeypot / Threat / Malware / Cyber Insider Threat / Computer security / Computer network security / Security

Fighting cyber threats – CERT perspective Current issues and research areas Piotr Kijewski () 4th EU-Japan Symposium on New Generation Networks and Future Internet 19th January 2012, Tokyo, Japan

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-31 03:10:30
19Computer security / Honeypot / Malware / Client honeypot / Computer-aided audit tools / Physics / Data analysis / Analysis / Mind / Computer network security / Spamming / Science

security_analytics_project_black.ppt

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
20Honeypot / Noah / Client honeypot / Computer network security / Carnegie Mellon University / Computer emergency response team

NoAH Honeynet Project 17th TF-CSIRT EventJanuary 2006 DFN-CERT Services GmbH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-01-30 06:04:29
UPDATE