[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arxiv preprint arxiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Lessons learned from the deployment of a high-interaction honeypot

E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six …

Profiling attacker behavior following SSH compromises

D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …

Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

V Nicomette, M Kaâniche, E Alata, M Herrb - Journal in computer virology, 2011 - Springer
This paper presents the lessons learned from an empirical analysis of attackers behaviours
based on the deployment on the Internet of a high-interaction honeypot for more than 1 year …

Observing internet worm and virus attacks with a small network telescope

U Harder, MW Johnson, JT Bradley… - Electronic Notes in …, 2006 - Elsevier
A network telescope is a portion of IP address space dedicated to observing inbound
internet traffic. The purpose of a network telescope is to detect and log malicious traffic which …

The leurre. com project: collecting internet threats information using a worldwide distributed honeynet

C Leita, VH Pham, O Thonnard… - … Data Collection and …, 2008 - ieeexplore.ieee.org
This paper aims at presenting in some depth the Leurre. com project and its data collection
infrastructure. Launched in 2003 by the Institut Eurecom, this project is based on a …

Test and debug strategy of the PNX8525 Nexperia/sup TM/digital video platform system chip

B Vermeulen, S Oostdijk… - … Test Conference 2001 …, 2001 - ieeexplore.ieee.org
Decreasing feature sizes and increasing customer demand for more functionality have
forced design teams to re-use design blocks and application platforms. As a result, re-use of …

[PDF][PDF] Intrusion-resilient middleware design and validation

P Verissimo, M Correia, NF Neves… - … Assurance, Security and …, 2009 - academia.edu
Intrusion Tolerance has become a reference paradigm for dealing with intrusions and
accidental faults, achieving security and dependability in an automatic way, much along the …

Toward early warning against Internet worms based on critical‐sized networks

E Magkos, M Avlonitis, P Kotzanikolaou… - Security and …, 2013 - Wiley Online Library
In this paper, we build on a recent worm propagation stochastic model, in which random
effects during worm spreading were modeled by means of a stochastic differential equation …

Archetypal behavior in computer security

SN Rosenfeld, I Rus, M Cukier - Journal of Systems and Software, 2007 - Elsevier
The purpose of this study is to understand observed behavior and to diagnose and find
solutions to issues encountered in organizational computer security using a systemic …