Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. The setting of honeypots, which emulate vulnerable applications, is one method to collect attack code. We have proposed a dedicated hardware architecture for honeypots which allows both highspeed operation at 10 Gb/s and beyond and offers a high resilience against attacks on the honeypot infrastructure itself. In this work, we refine the base NetStage architecture for better management and scalability. Using dynamic partial reconfiguration, we can now update the functionality of the honeypot during operation. To allow the operation of a larger number of ...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
As new technological concepts appear and evolve, cyberattack surfaces and vectors are exploited. Eve...
Abstract—Malicious software has become a major threat to computer users on the Internet today. Secur...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
Abstract—Honeypots are dedicated machines whose aim is to delay and divert attackers away from criti...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Traditional defences against cyber threats such as Intrusion detection system or firewall were foun...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
The security of the Internet can be improved using reconfigurable hardware. A platform has been impl...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
As new technological concepts appear and evolve, cyberattack surfaces and vectors are exploited. Eve...
Abstract—Malicious software has become a major threat to computer users on the Internet today. Secur...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
Honeypots present networked computer systems with known security flaws to attackers and can serve to...
With the growing diversity of malware, researchers must be able to quickly collect many representati...
Abstract—Honeypots are dedicated machines whose aim is to delay and divert attackers away from criti...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Traditional defences against cyber threats such as Intrusion detection system or firewall were foun...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
The security of the Internet can be improved using reconfigurable hardware. A platform has been impl...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversarie...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
As new technological concepts appear and evolve, cyberattack surfaces and vectors are exploited. Eve...