Die Analyse von Angriffen auf IT-Systeme ist ein wichtiges Thema der ITSicherheitsforschung. Vor allem Honeypots und Darknets sind hier ein vielgenutztes System zur Analyse von Angriffen. Ziel dieser Arbeit ist die Erstellung eines Analysewerkzeugs,mit dessen Hilfe Angriffe auf Low-Interaction Honeypots untersucht werden können. Im Rahmen dieser Arbeit sollen verschiedene Analyseverfahren implementiert und evaluiert werden.The analysis of attacks on IT-systems is one major aspect of IT-security research.Especially honeypots and darknets are an often used tool for the analysis of attacks.The aim of this work is the design and implementation of an analytical tool which is capable of investigating attacks on low-interaction honeypots. Within t...
Honeypots are more and more used to collect data on malicious activities on the Internet and to bett...
In this Master thesis we will perform honeypot experiments where we allow malicious users access to ...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
The study of malware is a recurring topic in the security environment and the tool right for that jo...
In dieser Arbeit wird ein Prozess entwickelt und eingesetzt, mit dem Ereignisse, die an Honeypotsens...
This text deals with computer network security using honeypot technology, as a tool of intentional t...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
In einer Welt in der immer mehr Alltagsgegenstände mit dem Internet verbunden sind, wächst die Anzah...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
The security of their network remains the priorities of almost all companies. Existing security syst...
In this paper, system of automatic processing of attacks using honeypots is discussed. The first goa...
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the ...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
This thesis deals with the area of honeypots and honeynets. It defines their classification and cont...
Honeypots are more and more used to collect data on malicious activities on the Internet and to bett...
In this Master thesis we will perform honeypot experiments where we allow malicious users access to ...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
The study of malware is a recurring topic in the security environment and the tool right for that jo...
In dieser Arbeit wird ein Prozess entwickelt und eingesetzt, mit dem Ereignisse, die an Honeypotsens...
This text deals with computer network security using honeypot technology, as a tool of intentional t...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
In einer Welt in der immer mehr Alltagsgegenstände mit dem Internet verbunden sind, wächst die Anzah...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
The security of their network remains the priorities of almost all companies. Existing security syst...
In this paper, system of automatic processing of attacks using honeypots is discussed. The first goa...
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the ...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
This thesis deals with the area of honeypots and honeynets. It defines their classification and cont...
Honeypots are more and more used to collect data on malicious activities on the Internet and to bett...
In this Master thesis we will perform honeypot experiments where we allow malicious users access to ...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...