Bartl, 2014 - Google Patents

A client honeypot

Bartl, 2014

View PDF
Document ID
7595561740967169870
Author
Bartl V
Publication year
Publication venue
MASARYKOVA UNIVERSITY,[Online]. Available: https://is. muni. cz/th/dtmhv/thesis. pdf.[Accessed 6 Mar 2019]

External Links

Snippet

This thesis discusses a topic of malicious software giving emphasis on client side threats and vulnerable users. It gives an insight into concept of client honeypots and compares several implementations of this approach. A configuration of one selected tool is proposed …
Continue reading at is.muni.cz (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Sarmah et al. A survey of detection methods for XSS attacks
Trajanovski et al. An automated and comprehensive framework for IoT botnet detection and analysis (IoT-BDA)
Botacin et al. One size does not fit all: A longitudinal analysis of brazilian financial malware
Saad et al. Jsless: A tale of a fileless javascript memory-resident malware
Gan et al. A Review on detection of cross-site scripting attacks (XSS) in web security
Süren et al. Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits.
Narvaez et al. Drive-by-downloads
Alosefer Analysing web-based malware behaviour through client honeypots
Herr et al. Milware: Identification and implications of state authored malicious software
Belous et al. Computer viruses, malicious logic, and spyware
Simms et al. Keylogger detection using a decoy keyboard
Bartl A client honeypot
Burgess et al. Investigation of browser and web-based threats
Singhal Analysis and Categorization of Drive-By Download Malware Using Sandboxing and Yara Ruleset
Tari et al. Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security
Sarath et al. Malware Forensics Analysis and Detection in Cyber Physical Systems
Triantafyllou Malware analysis
Geniola et al. Automated analysis of freeware installers promoted by download portals
Barr-Smith Advances in detection and analysis of modern evasive malware
Alsmadi et al. The ontology of malwares
Li et al. Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning
Gardåsen Detecting Remote Administration Trojans through Dynamic Analysis using Finite-State Machines
Wagle Investigation and Evaluation of the Impact of Antivirus Protection on the Performance of a Personal Computer
Meyer Howthe difficulty of obtaining intrusion artifacts can influence threat modeling: An experiment that shows how IT forensics can be used preventingly
Süren An efficient and novel detection technique for next generation web-based exploitation kits