In this paper, we propose an efficient method for collecting large amounts of malicious Internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were collected on a campus network attached to the internet. We explain how we implemented various protocols in a stateless way. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols.Anglai
The paper deals with the need to enhance security of the VoIP infrastructure. There are several way...
International audienceMonitoring communication networks and their traffic is of essential importance...
Abstract—Recently, blind techniques have been applied to detect malicious traffic and attacks in hon...
During the last few years, the amount of malicious traffic on the Internet has increased due to the ...
As the Internet becomes an ubiquitous medium of communication, it carries more and more malicious ac...
The HoneyTank is a honeypot system which aims at collecting large amounts of malicious traffic by s...
In this paper, we propose a honeypot architecture for detecting and analyzing unknown network attack...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
A spoofing attack is when a malicious party imitates another system on a network as being from a kno...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
Abstract—Over the past several years, honeynets have proven invaluable for understanding the charact...
Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important compone...
Attacks like call fraud and identity theft often involve so-phisticated stateful attack patterns whi...
The paper deals with the need to enhance security of the VoIP infrastructure. There are several way...
International audienceMonitoring communication networks and their traffic is of essential importance...
Abstract—Recently, blind techniques have been applied to detect malicious traffic and attacks in hon...
During the last few years, the amount of malicious traffic on the Internet has increased due to the ...
As the Internet becomes an ubiquitous medium of communication, it carries more and more malicious ac...
The HoneyTank is a honeypot system which aims at collecting large amounts of malicious traffic by s...
In this paper, we propose a honeypot architecture for detecting and analyzing unknown network attack...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
A spoofing attack is when a malicious party imitates another system on a network as being from a kno...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
Abstract—Over the past several years, honeynets have proven invaluable for understanding the charact...
Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important compone...
Attacks like call fraud and identity theft often involve so-phisticated stateful attack patterns whi...
The paper deals with the need to enhance security of the VoIP infrastructure. There are several way...
International audienceMonitoring communication networks and their traffic is of essential importance...
Abstract—Recently, blind techniques have been applied to detect malicious traffic and attacks in hon...