Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior
暂无分享,去创建一个
[1] Susan Marie Wade. SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats , 2011 .
[2] Gianluca Stringhini,et al. What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild , 2016, Internet Measurement Conference.
[3] Damon McCoy,et al. To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[4] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[5] Evangelos P. Markatos,et al. A Systematic Characterization of IM Threats using Honeypots , 2010, NDSS.
[6] Marc Dacier,et al. Lessons learned from the deployment of a high-interaction honeypot , 2006, 2006 Sixth European Dependable Computing Conference.
[7] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[8] Robin Berthier,et al. Profiling Attacker Behavior Following SSH Compromises , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[9] Petros Nicopolitidis,et al. Analysis and visualization of SSH attacks using honeypots , 2013, Eurocon 2013.
[10] Marc Dacier,et al. Honeypots: practical means to validate malicious fault assumptions , 2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings..
[11] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..
[12] P. Biondi,et al. Honeypot forensics , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[13] Matthieu Herrb,et al. Set-up and deployment of a high-interaction honeypot: experiment and lessons learned , 2011, Journal in Computer Virology.
[14] Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.
[15] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[16] Collin Mulliner,et al. Nomadic Honeypots : A Novel Concept for Smartphone Honeypots , 2013 .
[17] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[18] Salvatore J. Stolfo,et al. Fox in the trap: thwarting masqueraders via automated decoy document deployment , 2015, EUROSEC.
[19] Debin Gao,et al. MobiPot: Understanding Mobile Telephony Threats with Honeycards , 2016, AsiaCCS.
[20] Markus Jakobsson,et al. Scambaiter: Understanding Targeted Nigerian Scams on Craigslist , 2014, NDSS.
[21] Davide Balzarotti,et al. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web , 2013, NDSS.