Client honeypot

Results: 68



#Item
11Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript Ben Feinstein, CISSP Daniel Peck {bfeinstein, dpeck}@secureworks.com

Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript Ben Feinstein, CISSP Daniel Peck {bfeinstein, dpeck}@secureworks.com

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:38
12Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis   Herbert Bos

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:31:23
13A design study for a distributed infrastructure to perform zero-day detection of cyberattacks  http://www.fp6-noah.org The three-year NoAH project gathers and analyses information about the nature of Internet cyberattack

A design study for a distributed infrastructure to perform zero-day detection of cyberattacks http://www.fp6-noah.org The three-year NoAH project gathers and analyses information about the nature of Internet cyberattack

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 14:04:11
14SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION  Contract No. RIDS

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2005-12-14 05:05:52
15INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-09-07 19:03:47
16The Impact of Honeynets for CSIRTs Jan Kohlrausch and Jochen Schönfelder DFN-CERT Services GmbH Heidenkampsweg 41 DHamburg [kohlrausch|schoenfelder]@dfn-cert.de

The Impact of Honeynets for CSIRTs Jan Kohlrausch and Jochen Schönfelder DFN-CERT Services GmbH Heidenkampsweg 41 DHamburg [kohlrausch|schoenfelder]@dfn-cert.de

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 13:18:12
17Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis   Herbert Bos

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
18Fighting cyber threats – CERT perspective Current issues and research areas Piotr Kijewski () 4th EU-Japan Symposium on New Generation Networks and Future Internet 19th January 2012, Tokyo, Japan

Fighting cyber threats – CERT perspective Current issues and research areas Piotr Kijewski () 4th EU-Japan Symposium on New Generation Networks and Future Internet 19th January 2012, Tokyo, Japan

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-31 03:10:30
19security_analytics_project_black.ppt

security_analytics_project_black.ppt

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
20NoAH Honeynet Project  17th TF-CSIRT EventJanuary 2006 DFN-CERT Services GmbH

NoAH Honeynet Project 17th TF-CSIRT EventJanuary 2006 DFN-CERT Services GmbH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-01-30 06:04:29