首页> 外文OA文献 >An Analysis of Honeypot Programs and the Attack Data Collected
【2h】

An Analysis of Honeypot Programs and the Attack Data Collected

机译:Honeypot程序分析和攻击数据收集

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Honeypots are computers specifically deployed to be a resource that is expected to be attacked or compromised. While the attacker is distracted with the decoy computer system we learn about the attacker and their methods of attack. From the information gained about the attacks we can then review and harden out security systems. Compared to an Intrusion Detection System (IDS) which may trigger false positives, we take the standpoint that nobody ought to be interacting with the decoy computer; therefore we regard all interactions to be of value and worth investigation. A sample of honeypots are evaluated and one selected to collect attacks. The captured attacks reveal the source IP address of the attacker and the service port under attack. Attacks where the exploit attempts to deploy a binary can capture the code, and automatically submit it for analysis to sandboxes such as VirusTotal.
机译:蜜罐是专门部署为预期会受到攻击或破坏的资源的计算机。当攻击者对诱饵计算机系统分心时,我们将了解攻击者及其攻击方法。从获得的有关攻击的信息中,我们可以查看并强化安全系统。与可能触发误报的入侵检测系统(IDS)相比,我们认为没有人应该与诱饵计算机进行交互。因此,我们认为所有互动都是有价值的,值得研究。评估了一个蜜罐样本,并选择了一个蜜罐来收集攻击。捕获的攻击会揭示攻击者的源IP地址和受攻击的服务端口。利用漏洞尝试部署二进制文件的攻击可以捕获代码,并自动将其提交给沙箱(例如VirusTotal)进行分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号