Bartl, 2014 - Google Patents
A client honeypotBartl, 2014
View PDF- Document ID
- 7595561740967169870
- Author
- Bartl V
- Publication year
- Publication venue
- MASARYKOVA UNIVERSITY,[Online]. Available: https://is. muni. cz/th/dtmhv/thesis. pdf.[Accessed 6 Mar 2019]
External Links
Snippet
This thesis discusses a topic of malicious software giving emphasis on client side threats and vulnerable users. It gives an insight into concept of client honeypots and compares several implementations of this approach. A configuration of one selected tool is proposed …
- 238000002474 experimental method 0 abstract description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarmah et al. | A survey of detection methods for XSS attacks | |
Trajanovski et al. | An automated and comprehensive framework for IoT botnet detection and analysis (IoT-BDA) | |
Botacin et al. | One size does not fit all: A longitudinal analysis of brazilian financial malware | |
Saad et al. | Jsless: A tale of a fileless javascript memory-resident malware | |
Gan et al. | A Review on detection of cross-site scripting attacks (XSS) in web security | |
Süren et al. | Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. | |
Narvaez et al. | Drive-by-downloads | |
Alosefer | Analysing web-based malware behaviour through client honeypots | |
Herr et al. | Milware: Identification and implications of state authored malicious software | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Simms et al. | Keylogger detection using a decoy keyboard | |
Bartl | A client honeypot | |
Burgess et al. | Investigation of browser and web-based threats | |
Singhal | Analysis and Categorization of Drive-By Download Malware Using Sandboxing and Yara Ruleset | |
Tari et al. | Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security | |
Sarath et al. | Malware Forensics Analysis and Detection in Cyber Physical Systems | |
Triantafyllou | Malware analysis | |
Geniola et al. | Automated analysis of freeware installers promoted by download portals | |
Barr-Smith | Advances in detection and analysis of modern evasive malware | |
Alsmadi et al. | The ontology of malwares | |
Li et al. | Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning | |
Gardåsen | Detecting Remote Administration Trojans through Dynamic Analysis using Finite-State Machines | |
Wagle | Investigation and Evaluation of the Impact of Antivirus Protection on the Performance of a Personal Computer | |
Meyer | Howthe difficulty of obtaining intrusion artifacts can influence threat modeling: An experiment that shows how IT forensics can be used preventingly | |
Süren | An efficient and novel detection technique for next generation web-based exploitation kits |