PhoneyC: a virtual client honeypot

作者: Jose Nazario

DOI:

关键词: HoneypotFocus (computing)Computer scienceModular designDrive-by downloadVisibility (geometry)Web browserObfuscationComputer securityWorld Wide Web

摘要: … of the honeypot theme. Just as with honeypots, honeyclients can be high interaction to simulate all aspects of the client operating system, whereas a low-interaction honeypot only …

参考文章(9)
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
Peter Komisarczuk, Ian Welch, Christian Seifert, HoneyC - The low-interaction client honeypot University of Wellington. ,(2006)
Felix C. Freiling, Thorsten Holz, Georg Wicherski, Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks Computer Security – ESORICS 2005. pp. 319- 335 ,(2005) , 10.1007/11555827_19
Fabian Monrose, Panayiotis Mavrommatis, Moheeb Abu Rajab, Niels Provos, All your iFRAMEs point to Us usenix security symposium. pp. 1- 15 ,(2008)
Chad Verbowski, Roussi Roussev, Xuxian Jiang, Yi-Min Wang, Shuo Chen, Doug Beck, Samuel T. King, Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. network and distributed system security symposium. pp. 12- ,(2006)
Steve Ward, Mat Hostetter, Curl: a language for web content International Journal of Web Engineering and Technology. ,vol. 1, pp. 41- 62 ,(2003) , 10.1504/IJWET.2003.003259
O. Hallaraker, G. Vigna, Detecting malicious JavaScript code in Mozilla international conference on engineering of complex computer systems. pp. 85- 94 ,(2005) , 10.1109/ICECCS.2005.35
Walter Goralski, Chapter 26 – Hypertext Transfer Protocol The Illustrated Network (Second Edition)#R##N#How TCP/IP Works in a Modern Network. pp. 661- 684 ,(2017) , 10.1016/B978-0-12-811027-0.00026-6
CompuTAX, Jonathan Levin, Dramatis Personae, Know your Enemy ,(2005)