Malicious fault characterization exploiting honeypot data
暂无分享,去创建一个
Olivier Thonnard | Vladimir Stankovic | M. Serafini | Urko Zurutuza | Corrado Leita | E. Alata | J. Viniikka
[1] Marc Dacier,et al. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots , 2006, RAID.
[2] Marc Dacier,et al. Empirical analysis and statistical modeling of attack processes based on honeypots , 2007, ArXiv.
[3] Marc Dacier,et al. Lessons learned from the deployment of a high-interaction honeypot , 2006, 2006 Sixth European Dependable Computing Conference.
[4] Marc Dacier,et al. SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models , 2008, 2008 Seventh European Dependable Computing Conference.
[5] Marc Dacier,et al. ScriptGen: an automated script generation tool for Honeyd , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[6] Philippe A. Palanque,et al. From Resilience-Building to Resilience-Scaling Technologies: Directions -- ReSIST NoE Deliverable D13 , 2007 .
[7] Hervé Debar,et al. Processing intrusion detection alert aggregates with time series modeling , 2009, Inf. Fusion.
[8] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[9] Van-Hau Pham,et al. on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .
[10] Marc Dacier,et al. SGNET: Implementation insights , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[11] Hervé Debar,et al. Time series modeling for IDS alert management , 2006, ASIACCS '06.