International audienceThe increase of various malicious activities spreading on the Internet network are today a crucial problem. In order to understand the motivations and operating modes of the attackers, it is necessary to collect data characterizing these malicious activities. Their analysis enables to better face these attacks, anticipate new threats and better adpat the corresponding protection mechanisms. This paper proposes a distributed platform oh high interaction honeypots deployed for that purpose. The paper describes 1) the design and implementation of this platform, 2) the methodology used to collect and record data characterizing the malicious activities and 3) the first analyses carried out on this data
The security of their network remains the priorities of almost all companies. Existing security syst...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
International audienceThe increase of various malicious activities spreading on the Internet network...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
Abstract. This paper presents the lessons learned from an empirical analysis of attackers behaviours...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
In recent years, the cyber warfare has gone far longer and wider than it used to be. Cyber terrorism...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
The security of their network remains the priorities of almost all companies. Existing security syst...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
International audienceThe increase of various malicious activities spreading on the Internet network...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
Abstract. This paper presents the lessons learned from an empirical analysis of attackers behaviours...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
In recent years, the cyber warfare has gone far longer and wider than it used to be. Cyber terrorism...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
The security of their network remains the priorities of almost all companies. Existing security syst...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...