With the growing diversity of malware, researchers must be able to quickly collect many representative samples for study. This can be done, e.g., by using honeypots. As an alternative to software-based honeypots, we propose a singlechip honeypot appliance that is entirely hardware-based and thus significantly more resilient against compromising attacks. Additionally, it can easily keep up with network speeds of 10+ Gb/s and emulate thousands of vulnerable hosts. As base technology, we employ reconfigurable hardware devices whose functionality is not fixed by the manufacturing process. We present improvements to the platform, aiming to simplify management and updates. To this end, we introduce the domain-specific language VEDL, which can be ...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Client-side computers connected to the Internet today are exposed to a lot malicious activity. Brows...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Malicious software has become a major threat to computer users on the Internet today. Security resea...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Traditional defences against cyber threats such as Intrusion detection system or firewall were foun...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
Honeypots are closely monitored network decoys serving several purposes: they can distract adversari...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Because botnets can be used for illicit financial gain, they have become quite popular in recent I...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Client-side computers connected to the Internet today are exposed to a lot malicious activity. Brows...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Malicious software has become a major threat to computer users on the Internet today. Security resea...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Traditional defences against cyber threats such as Intrusion detection system or firewall were foun...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
Honeypots are closely monitored network decoys serving several purposes: they can distract adversari...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Because botnets can be used for illicit financial gain, they have become quite popular in recent I...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Client-side computers connected to the Internet today are exposed to a lot malicious activity. Brows...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...