Collecting Internet Malware Based on Client-side Honeypot
暂无分享,去创建一个
Yang Wang | Xiaoyan Sun | Jie Ren | Yuefei Zhu | Shengli Liu
[1] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[2] Carsten Willems,et al. Measurement and Analysis of Autonomous Spreading Malware in a University Environment , 2007, DIMVA.
[3] Ed Skoudis,et al. Malware: Fighting Malicious Code , 2003 .
[4] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[5] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[6] Chengyu Song,et al. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots , 2007, ICICS.
[7] C. Seifert. Know Your Enemy: Malicious Web Servers , 2007 .
[8] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.